input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=60.63.92.173 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=21.6.188.35 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=21.6.188.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 36108 facilitycode: 23 facilitylabel: local7 fqdn: /* localhostname: WAFirewall localstarttime: 1703509558882 messagetype: MALFORMED_VERSION priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'SessionID:-', 'ProxyIP:162.142.125.217'] vendorcode: 119 streamName: barracuda_waf clientIP: 21.6.188.35 serverIP: 60.63.92.173 userName: -
Explain this syslog message
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=111.70.163.22 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=46.135.166.36 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=46.135.166.36 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 36108, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/*", "localhostname": "WAFirewall", "localstarttime": "1703509558882 ", "message": "<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=111.70.163.22 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=46.135.166.36 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=46.135.166.36 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "MALFORMED_VERSION", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_MALFORMED_VERSION", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION", "SessionID:-", "ProxyIP:162.142.125.217" ], "vendorcode": "119", "streamName": "barracuda_waf", "clientIP": "46.135.166.36", "serverIP": "111.70.163.22", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=111.70.163.22 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=46.135.166.36 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=46.135.166.36 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=111.70.163.22 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=46.135.166.36 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=46.135.166.36 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 36108 facilitycode: 23 facilitylabel: local7 fqdn: /* localhostname: WAFirewall localstarttime: 1703509558882 messagetype: MALFORMED_VERSION priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'SessionID:-', 'ProxyIP:162.142.125.217'] vendorcode: 119 streamName: barracuda_waf clientIP: 46.135.166.36 serverIP: 111.70.163.22 userName: -
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t20.99.195.252\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"DBS2.stark.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"20.99.195.252","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}}
{ "senderhost": "DBS2.uwca.org", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-03-07T16:56:19.680Z\",\"agent\":{\"ephemeral_id\":\"df00ee52-2c5d-4c00-b478-32c2ed2c05c3\",\"id\":\"9405d2f8-4cbe-4435-a355-d0300c1bfe27\",\"name\":\"DBS2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-03-07T16:56:21.193Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"DBS2.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tLT00678\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT00678\\n\\tSource Network Address:\\t20.99.195.252\\n\\tSource Port:\\t\\t62505\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"STARK (stark.starkcloud.com)\",\"senderHost\":\"DBS2.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{a7632804-750d-475c-8601-c3a941d13200}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"DBS2.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"20.99.195.252\",\"IpPort\":\"62505\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT00678\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT00678\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":4800}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3818199,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 62505, "vendorcode": "3818199", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "20.99.195.252", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t20.99.195.252\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"DBS2.stark.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"20.99.195.252","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t20.99.195.252\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"DBS2.stark.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"20.99.195.252","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: DBS2.uwca.org severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 62505 vendorcode: 3818199 action: Logon streamName: microsoft-windows-security-auditing clientIP: 20.99.195.252 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t85.244.142.23\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"DBS2.wayne.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"85.244.142.23","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}}
{ "senderhost": "DBS2.uwca.org", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-03-07T16:56:19.680Z\",\"agent\":{\"ephemeral_id\":\"df00ee52-2c5d-4c00-b478-32c2ed2c05c3\",\"id\":\"9405d2f8-4cbe-4435-a355-d0300c1bfe27\",\"name\":\"DBS2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-03-07T16:56:21.193Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"DBS2.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tLT00678\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT00678\\n\\tSource Network Address:\\t85.244.142.23\\n\\tSource Port:\\t\\t62505\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"WAYNE (wayne.waynecloud.com)\",\"senderHost\":\"DBS2.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{a7632804-750d-475c-8601-c3a941d13200}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"DBS2.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"85.244.142.23\",\"IpPort\":\"62505\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT00678\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT00678\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":4800}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3818199,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 62505, "vendorcode": "3818199", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "85.244.142.23", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t85.244.142.23\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"DBS2.wayne.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"85.244.142.23","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t85.244.142.23\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"DBS2.wayne.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"85.244.142.23","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: DBS2.uwca.org severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 62505 vendorcode: 3818199 action: Logon streamName: microsoft-windows-security-auditing clientIP: 85.244.142.23 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t21.223.205.75\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"DBS2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"21.223.205.75","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}}
{ "senderhost": "DBS2.uwca.org", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-03-07T16:56:19.680Z\",\"agent\":{\"ephemeral_id\":\"df00ee52-2c5d-4c00-b478-32c2ed2c05c3\",\"id\":\"9405d2f8-4cbe-4435-a355-d0300c1bfe27\",\"name\":\"DBS2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-03-07T16:56:21.193Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"DBS2.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tLT00678\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT00678\\n\\tSource Network Address:\\t21.223.205.75\\n\\tSource Port:\\t\\t62505\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"ACME (acme.acmecloud.com)\",\"senderHost\":\"DBS2.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{a7632804-750d-475c-8601-c3a941d13200}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"DBS2.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"21.223.205.75\",\"IpPort\":\"62505\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT00678\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT00678\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":4800}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3818199,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 62505, "vendorcode": "3818199", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "21.223.205.75", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t21.223.205.75\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"DBS2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"21.223.205.75","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t21.223.205.75\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"DBS2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"21.223.205.75","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: DBS2.uwca.org severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 62505 vendorcode: 3818199 action: Logon streamName: microsoft-windows-security-auditing clientIP: 21.223.205.75 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t112.103.135.85\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"DBS2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"112.103.135.85","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}}
{ "senderhost": "DBS2.uwca.org", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-03-07T16:56:19.680Z\",\"agent\":{\"ephemeral_id\":\"df00ee52-2c5d-4c00-b478-32c2ed2c05c3\",\"id\":\"9405d2f8-4cbe-4435-a355-d0300c1bfe27\",\"name\":\"DBS2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-03-07T16:56:21.193Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"DBS2.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tLT00678\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT00678\\n\\tSource Network Address:\\t112.103.135.85\\n\\tSource Port:\\t\\t62505\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"ACME (acme.acmecloud.com)\",\"senderHost\":\"DBS2.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{a7632804-750d-475c-8601-c3a941d13200}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"DBS2.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"112.103.135.85\",\"IpPort\":\"62505\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT00678\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT00678\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":4800}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3818199,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 62505, "vendorcode": "3818199", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "112.103.135.85", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t112.103.135.85\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"DBS2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"112.103.135.85","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t112.103.135.85\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"DBS2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"112.103.135.85","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: DBS2.uwca.org severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 62505 vendorcode: 3818199 action: Logon streamName: microsoft-windows-security-auditing clientIP: 112.103.135.85 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t127.148.178.89\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"DBS2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"127.148.178.89","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}}
{ "senderhost": "DBS2.uwca.org", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-03-07T16:56:19.680Z\",\"agent\":{\"ephemeral_id\":\"df00ee52-2c5d-4c00-b478-32c2ed2c05c3\",\"id\":\"9405d2f8-4cbe-4435-a355-d0300c1bfe27\",\"name\":\"DBS2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-03-07T16:56:21.193Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"DBS2.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tLT00678\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT00678\\n\\tSource Network Address:\\t127.148.178.89\\n\\tSource Port:\\t\\t62505\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"ACME (acme.acmecloud.com)\",\"senderHost\":\"DBS2.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{a7632804-750d-475c-8601-c3a941d13200}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"DBS2.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"127.148.178.89\",\"IpPort\":\"62505\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT00678\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT00678\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":4800}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3818199,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 62505, "vendorcode": "3818199", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "127.148.178.89", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t127.148.178.89\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"DBS2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"127.148.178.89","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t127.148.178.89\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"DBS2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"127.148.178.89","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: DBS2.uwca.org severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 62505 vendorcode: 3818199 action: Logon streamName: microsoft-windows-security-auditing clientIP: 127.148.178.89 userName: janedoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t20.166.221.204\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"DBS2.stark.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"20.166.221.204","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}}
{ "senderhost": "DBS2.uwca.org", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-03-07T16:56:19.680Z\",\"agent\":{\"ephemeral_id\":\"df00ee52-2c5d-4c00-b478-32c2ed2c05c3\",\"id\":\"9405d2f8-4cbe-4435-a355-d0300c1bfe27\",\"name\":\"DBS2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-03-07T16:56:21.193Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"DBS2.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tLT00678\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT00678\\n\\tSource Network Address:\\t20.166.221.204\\n\\tSource Port:\\t\\t62505\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"STARK (stark.starkcloud.com)\",\"senderHost\":\"DBS2.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{a7632804-750d-475c-8601-c3a941d13200}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"DBS2.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"20.166.221.204\",\"IpPort\":\"62505\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT00678\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT00678\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":4800}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3818199,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 62505, "vendorcode": "3818199", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "20.166.221.204", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t20.166.221.204\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"DBS2.stark.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"20.166.221.204","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t20.166.221.204\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"DBS2.stark.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"20.166.221.204","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: DBS2.uwca.org severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 62505 vendorcode: 3818199 action: Logon streamName: microsoft-windows-security-auditing clientIP: 20.166.221.204 userName: johndoe
Explain this syslog message
<185>Jan 21 00:59:43 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.137.39.31 dpt=443 act=DENY msg=[Known Http Attack Source] duser="-" src=240.125.195.231 spt=61522 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 21 2023 00:59:43 rt=1674284383721 request=/ requestClientApplication="Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers&#39; presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloal" dvchost=WAFirewall externalId=185d3203ddc-d6b92464 cn2=61522 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=240.125.195.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:205.210.31.9", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 21 00:59:43 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.137.39.31 dpt=443 act=DENY msg=[Known Http Attack Source] duser=\"-\" src=240.125.195.231 spt=61522 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jan 21 2023 00:59:43 rt=1674284383721 request=/ requestClientApplication=\"Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers&#39; presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloal\" dvchost=WAFirewall externalId=185d3203ddc-d6b92464 cn2=61522 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=240.125.195.231 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674284383721 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 61522, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "240.125.195.231", "serverIP": "104.137.39.31", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 21 00:59:43 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.137.39.31 dpt=443 act=DENY msg=[Known Http Attack Source] duser="-" src=240.125.195.231 spt=61522 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 21 2023 00:59:43 rt=1674284383721 request=/ requestClientApplication="Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers&#39; presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloal" dvchost=WAFirewall externalId=185d3203ddc-d6b92464 cn2=61522 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=240.125.195.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 21 00:59:43 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.137.39.31 dpt=443 act=DENY msg=[Known Http Attack Source] duser="-" src=240.125.195.231 spt=61522 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 21 2023 00:59:43 rt=1674284383721 request=/ requestClientApplication="Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers&#39; presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloal" dvchost=WAFirewall externalId=185d3203ddc-d6b92464 cn2=61522 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=240.125.195.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:205.210.31.9', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674284383721 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 61522 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 240.125.195.231 serverIP: 104.137.39.31 userName: -
Explain this syslog message
<185>Jan 21 00:59:43 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=39.133.46.78 dpt=443 act=DENY msg=[Known Http Attack Source] duser="-" src=74.101.200.197 spt=61522 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 21 2023 00:59:43 rt=1674284383721 request=/ requestClientApplication="Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers&#39; presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloal" dvchost=WAFirewall externalId=185d3203ddc-d6b92464 cn2=61522 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.101.200.197 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:205.210.31.9", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 21 00:59:43 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=39.133.46.78 dpt=443 act=DENY msg=[Known Http Attack Source] duser=\"-\" src=74.101.200.197 spt=61522 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jan 21 2023 00:59:43 rt=1674284383721 request=/ requestClientApplication=\"Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers&#39; presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloal\" dvchost=WAFirewall externalId=185d3203ddc-d6b92464 cn2=61522 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.101.200.197 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674284383721 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 61522, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "74.101.200.197", "serverIP": "39.133.46.78", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 21 00:59:43 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=39.133.46.78 dpt=443 act=DENY msg=[Known Http Attack Source] duser="-" src=74.101.200.197 spt=61522 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 21 2023 00:59:43 rt=1674284383721 request=/ requestClientApplication="Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers&#39; presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloal" dvchost=WAFirewall externalId=185d3203ddc-d6b92464 cn2=61522 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.101.200.197 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 21 00:59:43 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=39.133.46.78 dpt=443 act=DENY msg=[Known Http Attack Source] duser="-" src=74.101.200.197 spt=61522 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 21 2023 00:59:43 rt=1674284383721 request=/ requestClientApplication="Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers&#39; presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloal" dvchost=WAFirewall externalId=185d3203ddc-d6b92464 cn2=61522 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.101.200.197 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:205.210.31.9', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674284383721 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 61522 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 74.101.200.197 serverIP: 39.133.46.78 userName: -
Explain this syslog message
<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=96.28.236.157 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=156.63.129.96 spt=35582 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 " dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=156.63.129.96 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 35582, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1700758069563 ", "message": "<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=96.28.236.157 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=156.63.129.96 spt=35582 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 \" dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=156.63.129.96 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:185.180.143.148", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "156.63.129.96", "serverIP": "96.28.236.157", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=96.28.236.157 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=156.63.129.96 spt=35582 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 " dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=156.63.129.96 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=96.28.236.157 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=156.63.129.96 spt=35582 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 " dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=156.63.129.96 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 35582 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1700758069563 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:185.180.143.148', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 156.63.129.96 serverIP: 96.28.236.157 userName: -
Explain this syslog message
<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=66.158.7.236 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=163.190.255.169 spt=35582 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 " dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.190.255.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 35582, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1700758069563 ", "message": "<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=66.158.7.236 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=163.190.255.169 spt=35582 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 \" dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.190.255.169 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:185.180.143.148", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "163.190.255.169", "serverIP": "66.158.7.236", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=66.158.7.236 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=163.190.255.169 spt=35582 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 " dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.190.255.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=66.158.7.236 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=163.190.255.169 spt=35582 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 " dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.190.255.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 35582 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1700758069563 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:185.180.143.148', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 163.190.255.169 serverIP: 66.158.7.236 userName: -
Explain this syslog message
<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=80.65.196.80 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=30.44.248.221 spt=35582 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 " dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.44.248.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 35582, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1700758069563 ", "message": "<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=80.65.196.80 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=30.44.248.221 spt=35582 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 \" dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.44.248.221 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:185.180.143.148", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "30.44.248.221", "serverIP": "80.65.196.80", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=80.65.196.80 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=30.44.248.221 spt=35582 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 " dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.44.248.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=80.65.196.80 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=30.44.248.221 spt=35582 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 " dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.44.248.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 35582 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1700758069563 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:185.180.143.148', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 30.44.248.221 serverIP: 80.65.196.80 userName: -
Explain this syslog message
<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=172.120.137.62 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=211.75.234.160 spt=59188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=211.75.234.160 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "FollowUpAction:NONE", "ProxyIP:152.89.196.211", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=172.120.137.62 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=211.75.234.160 spt=59188 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=211.75.234.160 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1671833822974 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 59188, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "211.75.234.160", "serverIP": "172.120.137.62", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=172.120.137.62 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=211.75.234.160 spt=59188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=211.75.234.160 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=172.120.137.62 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=211.75.234.160 spt=59188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=211.75.234.160 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1671833822974 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 59188 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 211.75.234.160 serverIP: 172.120.137.62 userName: -
Explain this syslog message
<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=113.172.189.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=63.195.126.212 spt=59188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=63.195.126.212 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "FollowUpAction:NONE", "ProxyIP:152.89.196.211", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=113.172.189.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=63.195.126.212 spt=59188 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=63.195.126.212 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1671833822974 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 59188, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "63.195.126.212", "serverIP": "113.172.189.224", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=113.172.189.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=63.195.126.212 spt=59188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=63.195.126.212 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=113.172.189.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=63.195.126.212 spt=59188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=63.195.126.212 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1671833822974 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 59188 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 63.195.126.212 serverIP: 113.172.189.224 userName: -
Explain this syslog message
<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=70.58.7.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=110.103.246.250 spt=59188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=110.103.246.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "FollowUpAction:NONE", "ProxyIP:152.89.196.211", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=70.58.7.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=110.103.246.250 spt=59188 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=110.103.246.250 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1671833822974 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 59188, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "110.103.246.250", "serverIP": "70.58.7.224", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=70.58.7.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=110.103.246.250 spt=59188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=110.103.246.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=70.58.7.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=110.103.246.250 spt=59188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=110.103.246.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1671833822974 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 59188 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 110.103.246.250 serverIP: 70.58.7.224 userName: -
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t80.83.102.182\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"80.83.102.182","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}}
{ "senderhost": "BODC1.backoffice.org", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-01-30T21:47:19.656Z\",\"agent\":{\"ephemeral_id\":\"d5c90a24-63ef-4bb5-b4a3-7ba128b949db\",\"id\":\"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc\",\"name\":\"BODC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-01-30T21:47:20.833Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC1.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tBACKOFFICE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tCCCC-TFK2\\n\\tSource Network Address:\\t80.83.102.182\\n\\tSource Port:\\t\\t64357\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"STARK (stark.starkcloud.com)\",\"senderHost\":\"BODC1.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC1.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"80.83.102.182\",\"IpPort\":\"64357\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"BACKOFFICE\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"CCCC-TFK2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":2732}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":19317155,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 64357, "vendorcode": "19317155", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "80.83.102.182", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t80.83.102.182\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"80.83.102.182","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t80.83.102.182\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"80.83.102.182","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: BODC1.backoffice.org severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 64357 vendorcode: 19317155 action: Logon streamName: microsoft-windows-security-auditing clientIP: 80.83.102.182 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t67.252.106.145\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"67.252.106.145","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}}
{ "senderhost": "BODC1.backoffice.org", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-01-30T21:47:19.656Z\",\"agent\":{\"ephemeral_id\":\"d5c90a24-63ef-4bb5-b4a3-7ba128b949db\",\"id\":\"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc\",\"name\":\"BODC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-01-30T21:47:20.833Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC1.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tBACKOFFICE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tCCCC-TFK2\\n\\tSource Network Address:\\t67.252.106.145\\n\\tSource Port:\\t\\t64357\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"ACME (acme.acmecloud.com)\",\"senderHost\":\"BODC1.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC1.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"67.252.106.145\",\"IpPort\":\"64357\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"BACKOFFICE\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"CCCC-TFK2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":2732}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":19317155,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 64357, "vendorcode": "19317155", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "67.252.106.145", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t67.252.106.145\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"67.252.106.145","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t67.252.106.145\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"67.252.106.145","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: BODC1.backoffice.org severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 64357 vendorcode: 19317155 action: Logon streamName: microsoft-windows-security-auditing clientIP: 67.252.106.145 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t130.57.246.111\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"130.57.246.111","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}}
{ "senderhost": "BODC1.backoffice.org", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-01-30T21:47:19.656Z\",\"agent\":{\"ephemeral_id\":\"d5c90a24-63ef-4bb5-b4a3-7ba128b949db\",\"id\":\"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc\",\"name\":\"BODC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-01-30T21:47:20.833Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC1.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tBACKOFFICE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tCCCC-TFK2\\n\\tSource Network Address:\\t130.57.246.111\\n\\tSource Port:\\t\\t64357\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"ACME (acme.acmecloud.com)\",\"senderHost\":\"BODC1.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC1.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"130.57.246.111\",\"IpPort\":\"64357\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"BACKOFFICE\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"CCCC-TFK2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":2732}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":19317155,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 64357, "vendorcode": "19317155", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "130.57.246.111", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t130.57.246.111\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"130.57.246.111","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t130.57.246.111\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"130.57.246.111","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: BODC1.backoffice.org severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 64357 vendorcode: 19317155 action: Logon streamName: microsoft-windows-security-auditing clientIP: 130.57.246.111 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t14.93.78.5\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"14.93.78.5","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}}
{ "senderhost": "BODC1.backoffice.org", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-01-30T21:47:19.656Z\",\"agent\":{\"ephemeral_id\":\"d5c90a24-63ef-4bb5-b4a3-7ba128b949db\",\"id\":\"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc\",\"name\":\"BODC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-01-30T21:47:20.833Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC1.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tBACKOFFICE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tCCCC-TFK2\\n\\tSource Network Address:\\t14.93.78.5\\n\\tSource Port:\\t\\t64357\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"ACME (acme.acmecloud.com)\",\"senderHost\":\"BODC1.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC1.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"14.93.78.5\",\"IpPort\":\"64357\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"BACKOFFICE\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"CCCC-TFK2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":2732}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":19317155,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 64357, "vendorcode": "19317155", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "14.93.78.5", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t14.93.78.5\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"14.93.78.5","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t14.93.78.5\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"14.93.78.5","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: BODC1.backoffice.org severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 64357 vendorcode: 19317155 action: Logon streamName: microsoft-windows-security-auditing clientIP: 14.93.78.5 userName: nighthawk
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t11.82.242.129\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.82.242.129","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}}
{ "senderhost": "BODC1.backoffice.org", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-01-30T21:47:19.656Z\",\"agent\":{\"ephemeral_id\":\"d5c90a24-63ef-4bb5-b4a3-7ba128b949db\",\"id\":\"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc\",\"name\":\"BODC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-01-30T21:47:20.833Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC1.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tBACKOFFICE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tCCCC-TFK2\\n\\tSource Network Address:\\t11.82.242.129\\n\\tSource Port:\\t\\t64357\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"WAYNE (wayne.waynecloud.com)\",\"senderHost\":\"BODC1.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC1.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"11.82.242.129\",\"IpPort\":\"64357\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"BACKOFFICE\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"CCCC-TFK2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":2732}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":19317155,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 64357, "vendorcode": "19317155", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "11.82.242.129", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t11.82.242.129\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.82.242.129","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t11.82.242.129\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.82.242.129","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: BODC1.backoffice.org severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 64357 vendorcode: 19317155 action: Logon streamName: microsoft-windows-security-auditing clientIP: 11.82.242.129 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t11.237.189.35\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.237.189.35","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}}
{ "senderhost": "BODC1.backoffice.org", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-01-30T21:47:19.656Z\",\"agent\":{\"ephemeral_id\":\"d5c90a24-63ef-4bb5-b4a3-7ba128b949db\",\"id\":\"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc\",\"name\":\"BODC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-01-30T21:47:20.833Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC1.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tBACKOFFICE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tCCCC-TFK2\\n\\tSource Network Address:\\t11.237.189.35\\n\\tSource Port:\\t\\t64357\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"ACME (acme.acmecloud.com)\",\"senderHost\":\"BODC1.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC1.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"11.237.189.35\",\"IpPort\":\"64357\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"BACKOFFICE\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"CCCC-TFK2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":2732}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":19317155,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 64357, "vendorcode": "19317155", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "11.237.189.35", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t11.237.189.35\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.237.189.35","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t11.237.189.35\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.237.189.35","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: BODC1.backoffice.org severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 64357 vendorcode: 19317155 action: Logon streamName: microsoft-windows-security-auditing clientIP: 11.237.189.35 userName: fish
Explain this syslog message
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=247.121.30.107 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=106.230.199.100 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=106.230.199.100 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleType:GLOBAL", "barracuda_waf", "ProxyIP:173.231.60.196", "REMOTE_FILE_INCLUSION", "cef", "FollowUpAction:NONE", "barracuda_waf_REMOTE_FILE_INCLUSION", "AttackGroup:Injection Attacks", "rfc3164", "RuleID:security-policy", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=247.121.30.107 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/\"] duser=\"-\" src=106.230.199.100 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)\" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=106.230.199.100 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1660728184600 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "REMOTE_FILE_INCLUSION", "severitycode": 9, "fqdn": "/comm/AndarTrack.jsp", "clientport": 40194, "vendorcode": "164", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "106.230.199.100", "serverIP": "247.121.30.107", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=247.121.30.107 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=106.230.199.100 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=106.230.199.100 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=247.121.30.107 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=106.230.199.100 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=106.230.199.100 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleType:GLOBAL', 'barracuda_waf', 'ProxyIP:173.231.60.196', 'REMOTE_FILE_INCLUSION', 'cef', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1660728184600 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: REMOTE_FILE_INCLUSION severitycode: 9 fqdn: /comm/AndarTrack.jsp clientport: 40194 vendorcode: 164 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 106.230.199.100 serverIP: 247.121.30.107 userName: -
Explain this syslog message
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=35.238.40.206 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=61.141.124.188 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=61.141.124.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleType:GLOBAL", "barracuda_waf", "ProxyIP:173.231.60.196", "REMOTE_FILE_INCLUSION", "cef", "FollowUpAction:NONE", "barracuda_waf_REMOTE_FILE_INCLUSION", "AttackGroup:Injection Attacks", "rfc3164", "RuleID:security-policy", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=35.238.40.206 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/\"] duser=\"-\" src=61.141.124.188 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)\" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=61.141.124.188 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1660728184600 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "REMOTE_FILE_INCLUSION", "severitycode": 9, "fqdn": "/comm/AndarTrack.jsp", "clientport": 40194, "vendorcode": "164", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "61.141.124.188", "serverIP": "35.238.40.206", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=35.238.40.206 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=61.141.124.188 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=61.141.124.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=35.238.40.206 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=61.141.124.188 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=61.141.124.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleType:GLOBAL', 'barracuda_waf', 'ProxyIP:173.231.60.196', 'REMOTE_FILE_INCLUSION', 'cef', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1660728184600 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: REMOTE_FILE_INCLUSION severitycode: 9 fqdn: /comm/AndarTrack.jsp clientport: 40194 vendorcode: 164 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 61.141.124.188 serverIP: 35.238.40.206 userName: -
Explain this syslog message
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=182.167.106.55 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=122.45.107.234 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=122.45.107.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleType:GLOBAL", "barracuda_waf", "ProxyIP:173.231.60.196", "REMOTE_FILE_INCLUSION", "cef", "FollowUpAction:NONE", "barracuda_waf_REMOTE_FILE_INCLUSION", "AttackGroup:Injection Attacks", "rfc3164", "RuleID:security-policy", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=182.167.106.55 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/\"] duser=\"-\" src=122.45.107.234 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)\" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=122.45.107.234 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1660728184600 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "REMOTE_FILE_INCLUSION", "severitycode": 9, "fqdn": "/comm/AndarTrack.jsp", "clientport": 40194, "vendorcode": "164", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "122.45.107.234", "serverIP": "182.167.106.55", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=182.167.106.55 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=122.45.107.234 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=122.45.107.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=182.167.106.55 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=122.45.107.234 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=122.45.107.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleType:GLOBAL', 'barracuda_waf', 'ProxyIP:173.231.60.196', 'REMOTE_FILE_INCLUSION', 'cef', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1660728184600 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: REMOTE_FILE_INCLUSION severitycode: 9 fqdn: /comm/AndarTrack.jsp clientport: 40194 vendorcode: 164 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 122.45.107.234 serverIP: 182.167.106.55 userName: -
Explain this syslog message
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=127.78.75.37 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=13.135.212.23 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=13.135.212.23 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleType:GLOBAL", "barracuda_waf", "ProxyIP:173.231.60.196", "REMOTE_FILE_INCLUSION", "cef", "FollowUpAction:NONE", "barracuda_waf_REMOTE_FILE_INCLUSION", "AttackGroup:Injection Attacks", "rfc3164", "RuleID:security-policy", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=127.78.75.37 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/\"] duser=\"-\" src=13.135.212.23 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)\" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=13.135.212.23 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1660728184600 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "REMOTE_FILE_INCLUSION", "severitycode": 9, "fqdn": "/comm/AndarTrack.jsp", "clientport": 40194, "vendorcode": "164", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "13.135.212.23", "serverIP": "127.78.75.37", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=127.78.75.37 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=13.135.212.23 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=13.135.212.23 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=127.78.75.37 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=13.135.212.23 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=13.135.212.23 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleType:GLOBAL', 'barracuda_waf', 'ProxyIP:173.231.60.196', 'REMOTE_FILE_INCLUSION', 'cef', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1660728184600 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: REMOTE_FILE_INCLUSION severitycode: 9 fqdn: /comm/AndarTrack.jsp clientport: 40194 vendorcode: 164 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 13.135.212.23 serverIP: 127.78.75.37 userName: -
Explain this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"235.122.159.41","externalIp":"57.173.97.227","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=235.122.159.41 ::: serverIP=57.173.97.227 ::: userName=alice ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-13T06:02:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"235.122.159.41\",\"externalIp\":\"57.173.97.227\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:02:58.000Z\"} ::: clientIP=235.122.159.41 ::: serverIP=57.173.97.227 ::: userName=alice ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "bit.ly", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "bit.ly", "vendorcode": "URL ShortenersApplicationCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "235.122.159.41", "serverIP": "57.173.97.227", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"235.122.159.41","externalIp":"57.173.97.227","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=235.122.159.41 ::: serverIP=57.173.97.227 ::: userName=alice ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"235.122.159.41","externalIp":"57.173.97.227","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=235.122.159.41 ::: serverIP=57.173.97.227 ::: userName=alice ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-13T06:02:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: bit.ly messagetype: firewall_action severitycode: 2 fqdn: bit.ly vendorcode: URL ShortenersApplicationCryptomining action: block streamName: OpenDNS Detection clientIP: 235.122.159.41 serverIP: 57.173.97.227 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"254.235.8.28","externalIp":"150.95.33.130","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=254.235.8.28 ::: serverIP=150.95.33.130 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-13T06:02:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"254.235.8.28\",\"externalIp\":\"150.95.33.130\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:02:58.000Z\"} ::: clientIP=254.235.8.28 ::: serverIP=150.95.33.130 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "bit.ly", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "bit.ly", "vendorcode": "URL ShortenersApplicationCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "254.235.8.28", "serverIP": "150.95.33.130", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"254.235.8.28","externalIp":"150.95.33.130","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=254.235.8.28 ::: serverIP=150.95.33.130 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"254.235.8.28","externalIp":"150.95.33.130","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=254.235.8.28 ::: serverIP=150.95.33.130 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-13T06:02:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: bit.ly messagetype: firewall_action severitycode: 2 fqdn: bit.ly vendorcode: URL ShortenersApplicationCryptomining action: block streamName: OpenDNS Detection clientIP: 254.235.8.28 serverIP: 150.95.33.130 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"142.151.105.85","externalIp":"217.44.111.187","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=142.151.105.85 ::: serverIP=217.44.111.187 ::: userName=janedoe ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-13T05:26:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"142.151.105.85\",\"externalIp\":\"217.44.111.187\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T05:26:58.000Z\"} ::: clientIP=142.151.105.85 ::: serverIP=217.44.111.187 ::: userName=janedoe ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "bit.ly", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "bit.ly", "vendorcode": "URL ShortenersApplicationCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "142.151.105.85", "serverIP": "217.44.111.187", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"142.151.105.85","externalIp":"217.44.111.187","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=142.151.105.85 ::: serverIP=217.44.111.187 ::: userName=janedoe ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"142.151.105.85","externalIp":"217.44.111.187","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=142.151.105.85 ::: serverIP=217.44.111.187 ::: userName=janedoe ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-13T05:26:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: bit.ly messagetype: firewall_action severitycode: 2 fqdn: bit.ly vendorcode: URL ShortenersApplicationCryptomining action: block streamName: OpenDNS Detection clientIP: 142.151.105.85 serverIP: 217.44.111.187 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"59.55.178.170","externalIp":"74.178.43.38","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=59.55.178.170 ::: serverIP=74.178.43.38 ::: userName=fish ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-13T05:26:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"59.55.178.170\",\"externalIp\":\"74.178.43.38\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T05:26:58.000Z\"} ::: clientIP=59.55.178.170 ::: serverIP=74.178.43.38 ::: userName=fish ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "bit.ly", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "bit.ly", "vendorcode": "URL ShortenersApplicationCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "59.55.178.170", "serverIP": "74.178.43.38", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"59.55.178.170","externalIp":"74.178.43.38","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=59.55.178.170 ::: serverIP=74.178.43.38 ::: userName=fish ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"59.55.178.170","externalIp":"74.178.43.38","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=59.55.178.170 ::: serverIP=74.178.43.38 ::: userName=fish ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-13T05:26:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: bit.ly messagetype: firewall_action severitycode: 2 fqdn: bit.ly vendorcode: URL ShortenersApplicationCryptomining action: block streamName: OpenDNS Detection clientIP: 59.55.178.170 serverIP: 74.178.43.38 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"239.238.11.133","externalIp":"152.45.42.222","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=239.238.11.133 ::: serverIP=152.45.42.222 ::: userName=charlie ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-29T19:11:24.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"239.238.11.133\",\"externalIp\":\"152.45.42.222\",\"categories\":[\"Malware\",\"File Transfer Services\"],\"tags\":[],\"destination\":\"my.mixtape.moe\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-29T19:11:24.000Z\"} ::: clientIP=239.238.11.133 ::: serverIP=152.45.42.222 ::: userName=charlie ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "my.mixtape.moe", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "my.mixtape.moe", "vendorcode": "MalwareFile Transfer Services", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "239.238.11.133", "serverIP": "152.45.42.222", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"239.238.11.133","externalIp":"152.45.42.222","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=239.238.11.133 ::: serverIP=152.45.42.222 ::: userName=charlie ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"239.238.11.133","externalIp":"152.45.42.222","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=239.238.11.133 ::: serverIP=152.45.42.222 ::: userName=charlie ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-29T19:11:24.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: my.mixtape.moe messagetype: firewall_action severitycode: 2 fqdn: my.mixtape.moe vendorcode: MalwareFile Transfer Services action: block streamName: OpenDNS Detection clientIP: 239.238.11.133 serverIP: 152.45.42.222 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"79.204.184.180","externalIp":"124.48.160.170","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=79.204.184.180 ::: serverIP=124.48.160.170 ::: userName=alice ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-29T19:11:24.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"79.204.184.180\",\"externalIp\":\"124.48.160.170\",\"categories\":[\"Malware\",\"File Transfer Services\"],\"tags\":[],\"destination\":\"my.mixtape.moe\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-29T19:11:24.000Z\"} ::: clientIP=79.204.184.180 ::: serverIP=124.48.160.170 ::: userName=alice ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "my.mixtape.moe", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "my.mixtape.moe", "vendorcode": "MalwareFile Transfer Services", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "79.204.184.180", "serverIP": "124.48.160.170", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"79.204.184.180","externalIp":"124.48.160.170","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=79.204.184.180 ::: serverIP=124.48.160.170 ::: userName=alice ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"79.204.184.180","externalIp":"124.48.160.170","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=79.204.184.180 ::: serverIP=124.48.160.170 ::: userName=alice ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-29T19:11:24.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: my.mixtape.moe messagetype: firewall_action severitycode: 2 fqdn: my.mixtape.moe vendorcode: MalwareFile Transfer Services action: block streamName: OpenDNS Detection clientIP: 79.204.184.180 serverIP: 124.48.160.170 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"230.143.11.239","externalIp":"240.96.225.58","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=230.143.11.239 ::: serverIP=240.96.225.58 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-13T06:02:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"230.143.11.239\",\"externalIp\":\"240.96.225.58\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:02:58.000Z\"} ::: clientIP=230.143.11.239 ::: serverIP=240.96.225.58 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "bit.ly", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "bit.ly", "vendorcode": "URL ShortenersApplicationCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "230.143.11.239", "serverIP": "240.96.225.58", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"230.143.11.239","externalIp":"240.96.225.58","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=230.143.11.239 ::: serverIP=240.96.225.58 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"230.143.11.239","externalIp":"240.96.225.58","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=230.143.11.239 ::: serverIP=240.96.225.58 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-13T06:02:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: bit.ly messagetype: firewall_action severitycode: 2 fqdn: bit.ly vendorcode: URL ShortenersApplicationCryptomining action: block streamName: OpenDNS Detection clientIP: 230.143.11.239 serverIP: 240.96.225.58 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"75.109.99.194","externalIp":"31.103.186.230","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=75.109.99.194 ::: serverIP=31.103.186.230 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-13T06:02:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"75.109.99.194\",\"externalIp\":\"31.103.186.230\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:02:58.000Z\"} ::: clientIP=75.109.99.194 ::: serverIP=31.103.186.230 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "bit.ly", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "bit.ly", "vendorcode": "URL ShortenersApplicationCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "75.109.99.194", "serverIP": "31.103.186.230", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"75.109.99.194","externalIp":"31.103.186.230","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=75.109.99.194 ::: serverIP=31.103.186.230 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"75.109.99.194","externalIp":"31.103.186.230","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=75.109.99.194 ::: serverIP=31.103.186.230 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-13T06:02:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: bit.ly messagetype: firewall_action severitycode: 2 fqdn: bit.ly vendorcode: URL ShortenersApplicationCryptomining action: block streamName: OpenDNS Detection clientIP: 75.109.99.194 serverIP: 31.103.186.230 userName: johndoe
Explain this syslog message