input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=60.63.92.173 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=21.6.188.35 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=21.6.188.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 36108
facilitycode: 23
facilitylabel: local7
fqdn: /*
localhostname: WAFirewall
localstarttime: 1703509558882
messagetype: MALFORMED_VERSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'SessionID:-', 'ProxyIP:162.142.125.217']
vendorcode: 119
streamName: barracuda_waf
clientIP: 21.6.188.35
serverIP: 60.63.92.173
userName: - | Explain this syslog message |
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=111.70.163.22 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=46.135.166.36 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=46.135.166.36 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 36108,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/*",
"localhostname": "WAFirewall",
"localstarttime": "1703509558882 ",
"message": "<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=111.70.163.22 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=46.135.166.36 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=46.135.166.36 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "MALFORMED_VERSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_MALFORMED_VERSION",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION",
"SessionID:-",
"ProxyIP:162.142.125.217"
],
"vendorcode": "119",
"streamName": "barracuda_waf",
"clientIP": "46.135.166.36",
"serverIP": "111.70.163.22",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=111.70.163.22 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=46.135.166.36 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=46.135.166.36 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=111.70.163.22 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=46.135.166.36 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=46.135.166.36 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 36108
facilitycode: 23
facilitylabel: local7
fqdn: /*
localhostname: WAFirewall
localstarttime: 1703509558882
messagetype: MALFORMED_VERSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'SessionID:-', 'ProxyIP:162.142.125.217']
vendorcode: 119
streamName: barracuda_waf
clientIP: 46.135.166.36
serverIP: 111.70.163.22
userName: - | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t20.99.195.252\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"DBS2.stark.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"20.99.195.252","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}} | {
"senderhost": "DBS2.uwca.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-03-07T16:56:19.680Z\",\"agent\":{\"ephemeral_id\":\"df00ee52-2c5d-4c00-b478-32c2ed2c05c3\",\"id\":\"9405d2f8-4cbe-4435-a355-d0300c1bfe27\",\"name\":\"DBS2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-03-07T16:56:21.193Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"DBS2.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tLT00678\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT00678\\n\\tSource Network Address:\\t20.99.195.252\\n\\tSource Port:\\t\\t62505\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"STARK (stark.starkcloud.com)\",\"senderHost\":\"DBS2.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{a7632804-750d-475c-8601-c3a941d13200}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"DBS2.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"20.99.195.252\",\"IpPort\":\"62505\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT00678\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT00678\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":4800}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3818199,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 62505,
"vendorcode": "3818199",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "20.99.195.252",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t20.99.195.252\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"DBS2.stark.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"20.99.195.252","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t20.99.195.252\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"DBS2.stark.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"20.99.195.252","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: DBS2.uwca.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 62505
vendorcode: 3818199
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 20.99.195.252
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t85.244.142.23\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"DBS2.wayne.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"85.244.142.23","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}} | {
"senderhost": "DBS2.uwca.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-03-07T16:56:19.680Z\",\"agent\":{\"ephemeral_id\":\"df00ee52-2c5d-4c00-b478-32c2ed2c05c3\",\"id\":\"9405d2f8-4cbe-4435-a355-d0300c1bfe27\",\"name\":\"DBS2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-03-07T16:56:21.193Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"DBS2.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tLT00678\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT00678\\n\\tSource Network Address:\\t85.244.142.23\\n\\tSource Port:\\t\\t62505\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"WAYNE (wayne.waynecloud.com)\",\"senderHost\":\"DBS2.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{a7632804-750d-475c-8601-c3a941d13200}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"DBS2.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"85.244.142.23\",\"IpPort\":\"62505\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT00678\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT00678\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":4800}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3818199,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 62505,
"vendorcode": "3818199",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "85.244.142.23",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t85.244.142.23\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"DBS2.wayne.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"85.244.142.23","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t85.244.142.23\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"DBS2.wayne.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"85.244.142.23","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: DBS2.uwca.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 62505
vendorcode: 3818199
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 85.244.142.23
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t21.223.205.75\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"DBS2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"21.223.205.75","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}} | {
"senderhost": "DBS2.uwca.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-03-07T16:56:19.680Z\",\"agent\":{\"ephemeral_id\":\"df00ee52-2c5d-4c00-b478-32c2ed2c05c3\",\"id\":\"9405d2f8-4cbe-4435-a355-d0300c1bfe27\",\"name\":\"DBS2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-03-07T16:56:21.193Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"DBS2.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tLT00678\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT00678\\n\\tSource Network Address:\\t21.223.205.75\\n\\tSource Port:\\t\\t62505\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"ACME (acme.acmecloud.com)\",\"senderHost\":\"DBS2.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{a7632804-750d-475c-8601-c3a941d13200}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"DBS2.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"21.223.205.75\",\"IpPort\":\"62505\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT00678\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT00678\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":4800}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3818199,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 62505,
"vendorcode": "3818199",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "21.223.205.75",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t21.223.205.75\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"DBS2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"21.223.205.75","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t21.223.205.75\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"DBS2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"21.223.205.75","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: DBS2.uwca.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 62505
vendorcode: 3818199
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 21.223.205.75
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t112.103.135.85\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"DBS2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"112.103.135.85","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}} | {
"senderhost": "DBS2.uwca.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-03-07T16:56:19.680Z\",\"agent\":{\"ephemeral_id\":\"df00ee52-2c5d-4c00-b478-32c2ed2c05c3\",\"id\":\"9405d2f8-4cbe-4435-a355-d0300c1bfe27\",\"name\":\"DBS2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-03-07T16:56:21.193Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"DBS2.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tLT00678\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT00678\\n\\tSource Network Address:\\t112.103.135.85\\n\\tSource Port:\\t\\t62505\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"ACME (acme.acmecloud.com)\",\"senderHost\":\"DBS2.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{a7632804-750d-475c-8601-c3a941d13200}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"DBS2.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"112.103.135.85\",\"IpPort\":\"62505\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT00678\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT00678\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":4800}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3818199,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 62505,
"vendorcode": "3818199",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "112.103.135.85",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t112.103.135.85\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"DBS2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"112.103.135.85","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t112.103.135.85\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"DBS2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"112.103.135.85","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: DBS2.uwca.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 62505
vendorcode: 3818199
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 112.103.135.85
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t127.148.178.89\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"DBS2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"127.148.178.89","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}} | {
"senderhost": "DBS2.uwca.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-03-07T16:56:19.680Z\",\"agent\":{\"ephemeral_id\":\"df00ee52-2c5d-4c00-b478-32c2ed2c05c3\",\"id\":\"9405d2f8-4cbe-4435-a355-d0300c1bfe27\",\"name\":\"DBS2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-03-07T16:56:21.193Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"DBS2.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tLT00678\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT00678\\n\\tSource Network Address:\\t127.148.178.89\\n\\tSource Port:\\t\\t62505\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"ACME (acme.acmecloud.com)\",\"senderHost\":\"DBS2.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{a7632804-750d-475c-8601-c3a941d13200}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"DBS2.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"127.148.178.89\",\"IpPort\":\"62505\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT00678\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT00678\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":4800}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3818199,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 62505,
"vendorcode": "3818199",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "127.148.178.89",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t127.148.178.89\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"DBS2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"127.148.178.89","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t127.148.178.89\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"DBS2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"127.148.178.89","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: DBS2.uwca.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 62505
vendorcode: 3818199
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 127.148.178.89
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t20.166.221.204\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"DBS2.stark.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"20.166.221.204","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}} | {
"senderhost": "DBS2.uwca.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-03-07T16:56:19.680Z\",\"agent\":{\"ephemeral_id\":\"df00ee52-2c5d-4c00-b478-32c2ed2c05c3\",\"id\":\"9405d2f8-4cbe-4435-a355-d0300c1bfe27\",\"name\":\"DBS2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-03-07T16:56:21.193Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"DBS2.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tLT00678\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT00678\\n\\tSource Network Address:\\t20.166.221.204\\n\\tSource Port:\\t\\t62505\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"STARK (stark.starkcloud.com)\",\"senderHost\":\"DBS2.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{a7632804-750d-475c-8601-c3a941d13200}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"DBS2.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"20.166.221.204\",\"IpPort\":\"62505\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT00678\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT00678\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":4800}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3818199,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 62505,
"vendorcode": "3818199",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "20.166.221.204",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t20.166.221.204\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"DBS2.stark.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"20.166.221.204","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-03-07T16:56:19.680Z","agent":{"ephemeral_id":"df00ee52-2c5d-4c00-b478-32c2ed2c05c3","id":"9405d2f8-4cbe-4435-a355-d0300c1bfe27","name":"DBS2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-03-07T16:56:21.193Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"DBS2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tLT00678\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00678\n\tSource Network Address:\t20.166.221.204\n\tSource Port:\t\t62505\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"DBS2.stark.org","sensitivity":"normal","winlog":{"activity_id":"{a7632804-750d-475c-8601-c3a941d13200}","api":"wineventlog","channel":"Security","computer_name":"DBS2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"20.166.221.204","IpPort":"62505","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00678","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00678"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":4800}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3818199,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: DBS2.uwca.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 62505
vendorcode: 3818199
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 20.166.221.204
userName: johndoe | Explain this syslog message |
<185>Jan 21 00:59:43 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.137.39.31 dpt=443 act=DENY msg=[Known Http Attack Source] duser="-" src=240.125.195.231 spt=61522 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 21 2023 00:59:43 rt=1674284383721 request=/ requestClientApplication="Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloal" dvchost=WAFirewall externalId=185d3203ddc-d6b92464 cn2=61522 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=240.125.195.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:205.210.31.9",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 21 00:59:43 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.137.39.31 dpt=443 act=DENY msg=[Known Http Attack Source] duser=\"-\" src=240.125.195.231 spt=61522 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jan 21 2023 00:59:43 rt=1674284383721 request=/ requestClientApplication=\"Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloal\" dvchost=WAFirewall externalId=185d3203ddc-d6b92464 cn2=61522 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=240.125.195.231 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674284383721 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 61522,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "240.125.195.231",
"serverIP": "104.137.39.31",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 21 00:59:43 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.137.39.31 dpt=443 act=DENY msg=[Known Http Attack Source] duser="-" src=240.125.195.231 spt=61522 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 21 2023 00:59:43 rt=1674284383721 request=/ requestClientApplication="Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloal" dvchost=WAFirewall externalId=185d3203ddc-d6b92464 cn2=61522 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=240.125.195.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 21 00:59:43 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.137.39.31 dpt=443 act=DENY msg=[Known Http Attack Source] duser="-" src=240.125.195.231 spt=61522 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 21 2023 00:59:43 rt=1674284383721 request=/ requestClientApplication="Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloal" dvchost=WAFirewall externalId=185d3203ddc-d6b92464 cn2=61522 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=240.125.195.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:205.210.31.9', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674284383721
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 61522
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 240.125.195.231
serverIP: 104.137.39.31
userName: - | Explain this syslog message |
<185>Jan 21 00:59:43 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=39.133.46.78 dpt=443 act=DENY msg=[Known Http Attack Source] duser="-" src=74.101.200.197 spt=61522 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 21 2023 00:59:43 rt=1674284383721 request=/ requestClientApplication="Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloal" dvchost=WAFirewall externalId=185d3203ddc-d6b92464 cn2=61522 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.101.200.197 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:205.210.31.9",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 21 00:59:43 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=39.133.46.78 dpt=443 act=DENY msg=[Known Http Attack Source] duser=\"-\" src=74.101.200.197 spt=61522 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jan 21 2023 00:59:43 rt=1674284383721 request=/ requestClientApplication=\"Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloal\" dvchost=WAFirewall externalId=185d3203ddc-d6b92464 cn2=61522 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.101.200.197 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674284383721 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 61522,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "74.101.200.197",
"serverIP": "39.133.46.78",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 21 00:59:43 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=39.133.46.78 dpt=443 act=DENY msg=[Known Http Attack Source] duser="-" src=74.101.200.197 spt=61522 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 21 2023 00:59:43 rt=1674284383721 request=/ requestClientApplication="Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloal" dvchost=WAFirewall externalId=185d3203ddc-d6b92464 cn2=61522 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.101.200.197 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 21 00:59:43 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=39.133.46.78 dpt=443 act=DENY msg=[Known Http Attack Source] duser="-" src=74.101.200.197 spt=61522 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 21 2023 00:59:43 rt=1674284383721 request=/ requestClientApplication="Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloal" dvchost=WAFirewall externalId=185d3203ddc-d6b92464 cn2=61522 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.101.200.197 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:205.210.31.9', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674284383721
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 61522
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 74.101.200.197
serverIP: 39.133.46.78
userName: - | Explain this syslog message |
<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=96.28.236.157 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=156.63.129.96 spt=35582 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 " dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=156.63.129.96 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 35582,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1700758069563 ",
"message": "<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=96.28.236.157 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=156.63.129.96 spt=35582 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 \" dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=156.63.129.96 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:185.180.143.148",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "156.63.129.96",
"serverIP": "96.28.236.157",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=96.28.236.157 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=156.63.129.96 spt=35582 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 " dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=156.63.129.96 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=96.28.236.157 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=156.63.129.96 spt=35582 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 " dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=156.63.129.96 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 35582
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1700758069563
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:185.180.143.148', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 156.63.129.96
serverIP: 96.28.236.157
userName: - | Explain this syslog message |
<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=66.158.7.236 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=163.190.255.169 spt=35582 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 " dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.190.255.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 35582,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1700758069563 ",
"message": "<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=66.158.7.236 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=163.190.255.169 spt=35582 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 \" dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.190.255.169 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:185.180.143.148",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "163.190.255.169",
"serverIP": "66.158.7.236",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=66.158.7.236 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=163.190.255.169 spt=35582 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 " dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.190.255.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=66.158.7.236 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=163.190.255.169 spt=35582 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 " dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.190.255.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 35582
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1700758069563
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:185.180.143.148', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 163.190.255.169
serverIP: 66.158.7.236
userName: - | Explain this syslog message |
<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=80.65.196.80 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=30.44.248.221 spt=35582 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 " dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.44.248.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 35582,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1700758069563 ",
"message": "<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=80.65.196.80 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=30.44.248.221 spt=35582 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 \" dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.44.248.221 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:185.180.143.148",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "30.44.248.221",
"serverIP": "80.65.196.80",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=80.65.196.80 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=30.44.248.221 spt=35582 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 " dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.44.248.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 23 10:47:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=80.65.196.80 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=30.44.248.221 spt=35582 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 23 2023 10:47:49 rt=1700758069563 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36 " dvchost=WAFirewall externalId=18bfd14a0c3-17d2ecf8 cn2=35582 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.44.248.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 35582
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1700758069563
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:185.180.143.148', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 30.44.248.221
serverIP: 80.65.196.80
userName: - | Explain this syslog message |
<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=172.120.137.62 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=211.75.234.160 spt=59188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=211.75.234.160 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"FollowUpAction:NONE",
"ProxyIP:152.89.196.211",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=172.120.137.62 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=211.75.234.160 spt=59188 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=211.75.234.160 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1671833822974 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 59188,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "211.75.234.160",
"serverIP": "172.120.137.62",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=172.120.137.62 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=211.75.234.160 spt=59188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=211.75.234.160 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=172.120.137.62 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=211.75.234.160 spt=59188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=211.75.234.160 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1671833822974
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 59188
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 211.75.234.160
serverIP: 172.120.137.62
userName: - | Explain this syslog message |
<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=113.172.189.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=63.195.126.212 spt=59188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=63.195.126.212 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"FollowUpAction:NONE",
"ProxyIP:152.89.196.211",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=113.172.189.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=63.195.126.212 spt=59188 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=63.195.126.212 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1671833822974 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 59188,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "63.195.126.212",
"serverIP": "113.172.189.224",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=113.172.189.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=63.195.126.212 spt=59188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=63.195.126.212 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=113.172.189.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=63.195.126.212 spt=59188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=63.195.126.212 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1671833822974
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 59188
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 63.195.126.212
serverIP: 113.172.189.224
userName: - | Explain this syslog message |
<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=70.58.7.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=110.103.246.250 spt=59188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=110.103.246.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"FollowUpAction:NONE",
"ProxyIP:152.89.196.211",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=70.58.7.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=110.103.246.250 spt=59188 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=110.103.246.250 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1671833822974 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 59188,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "110.103.246.250",
"serverIP": "70.58.7.224",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=70.58.7.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=110.103.246.250 spt=59188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=110.103.246.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 23 16:17:02 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=70.58.7.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=110.103.246.250 spt=59188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Dec 23 2022 16:17:02 rt=1671833822974 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=185410fa6fe-13cab80f cn2=59188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=110.103.246.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1671833822974
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 59188
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 110.103.246.250
serverIP: 70.58.7.224
userName: - | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t80.83.102.182\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"80.83.102.182","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}} | {
"senderhost": "BODC1.backoffice.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-01-30T21:47:19.656Z\",\"agent\":{\"ephemeral_id\":\"d5c90a24-63ef-4bb5-b4a3-7ba128b949db\",\"id\":\"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc\",\"name\":\"BODC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-01-30T21:47:20.833Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC1.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tBACKOFFICE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tCCCC-TFK2\\n\\tSource Network Address:\\t80.83.102.182\\n\\tSource Port:\\t\\t64357\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"STARK (stark.starkcloud.com)\",\"senderHost\":\"BODC1.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC1.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"80.83.102.182\",\"IpPort\":\"64357\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"BACKOFFICE\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"CCCC-TFK2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":2732}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":19317155,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 64357,
"vendorcode": "19317155",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "80.83.102.182",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t80.83.102.182\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"80.83.102.182","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t80.83.102.182\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"80.83.102.182","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: BODC1.backoffice.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 64357
vendorcode: 19317155
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 80.83.102.182
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t67.252.106.145\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"67.252.106.145","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}} | {
"senderhost": "BODC1.backoffice.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-01-30T21:47:19.656Z\",\"agent\":{\"ephemeral_id\":\"d5c90a24-63ef-4bb5-b4a3-7ba128b949db\",\"id\":\"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc\",\"name\":\"BODC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-01-30T21:47:20.833Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC1.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tBACKOFFICE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tCCCC-TFK2\\n\\tSource Network Address:\\t67.252.106.145\\n\\tSource Port:\\t\\t64357\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"ACME (acme.acmecloud.com)\",\"senderHost\":\"BODC1.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC1.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"67.252.106.145\",\"IpPort\":\"64357\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"BACKOFFICE\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"CCCC-TFK2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":2732}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":19317155,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 64357,
"vendorcode": "19317155",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "67.252.106.145",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t67.252.106.145\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"67.252.106.145","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t67.252.106.145\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"67.252.106.145","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: BODC1.backoffice.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 64357
vendorcode: 19317155
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 67.252.106.145
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t130.57.246.111\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"130.57.246.111","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}} | {
"senderhost": "BODC1.backoffice.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-01-30T21:47:19.656Z\",\"agent\":{\"ephemeral_id\":\"d5c90a24-63ef-4bb5-b4a3-7ba128b949db\",\"id\":\"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc\",\"name\":\"BODC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-01-30T21:47:20.833Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC1.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tBACKOFFICE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tCCCC-TFK2\\n\\tSource Network Address:\\t130.57.246.111\\n\\tSource Port:\\t\\t64357\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"ACME (acme.acmecloud.com)\",\"senderHost\":\"BODC1.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC1.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"130.57.246.111\",\"IpPort\":\"64357\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"BACKOFFICE\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"CCCC-TFK2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":2732}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":19317155,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 64357,
"vendorcode": "19317155",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "130.57.246.111",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t130.57.246.111\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"130.57.246.111","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t130.57.246.111\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"130.57.246.111","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: BODC1.backoffice.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 64357
vendorcode: 19317155
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 130.57.246.111
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t14.93.78.5\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"14.93.78.5","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}} | {
"senderhost": "BODC1.backoffice.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-01-30T21:47:19.656Z\",\"agent\":{\"ephemeral_id\":\"d5c90a24-63ef-4bb5-b4a3-7ba128b949db\",\"id\":\"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc\",\"name\":\"BODC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-01-30T21:47:20.833Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC1.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tBACKOFFICE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tCCCC-TFK2\\n\\tSource Network Address:\\t14.93.78.5\\n\\tSource Port:\\t\\t64357\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"ACME (acme.acmecloud.com)\",\"senderHost\":\"BODC1.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC1.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"14.93.78.5\",\"IpPort\":\"64357\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"BACKOFFICE\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"CCCC-TFK2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":2732}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":19317155,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 64357,
"vendorcode": "19317155",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "14.93.78.5",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t14.93.78.5\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"14.93.78.5","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t14.93.78.5\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"14.93.78.5","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: BODC1.backoffice.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 64357
vendorcode: 19317155
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 14.93.78.5
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t11.82.242.129\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.82.242.129","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}} | {
"senderhost": "BODC1.backoffice.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-01-30T21:47:19.656Z\",\"agent\":{\"ephemeral_id\":\"d5c90a24-63ef-4bb5-b4a3-7ba128b949db\",\"id\":\"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc\",\"name\":\"BODC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-01-30T21:47:20.833Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC1.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tBACKOFFICE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tCCCC-TFK2\\n\\tSource Network Address:\\t11.82.242.129\\n\\tSource Port:\\t\\t64357\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"WAYNE (wayne.waynecloud.com)\",\"senderHost\":\"BODC1.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC1.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"11.82.242.129\",\"IpPort\":\"64357\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"BACKOFFICE\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"CCCC-TFK2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":2732}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":19317155,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 64357,
"vendorcode": "19317155",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "11.82.242.129",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t11.82.242.129\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.82.242.129","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t11.82.242.129\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.82.242.129","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: BODC1.backoffice.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 64357
vendorcode: 19317155
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 11.82.242.129
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t11.237.189.35\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.237.189.35","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}} | {
"senderhost": "BODC1.backoffice.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-01-30T21:47:19.656Z\",\"agent\":{\"ephemeral_id\":\"d5c90a24-63ef-4bb5-b4a3-7ba128b949db\",\"id\":\"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc\",\"name\":\"BODC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-01-30T21:47:20.833Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC1.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tBACKOFFICE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tCCCC-TFK2\\n\\tSource Network Address:\\t11.237.189.35\\n\\tSource Port:\\t\\t64357\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"ACME (acme.acmecloud.com)\",\"senderHost\":\"BODC1.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC1.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"11.237.189.35\",\"IpPort\":\"64357\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"BACKOFFICE\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"CCCC-TFK2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":2732}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":19317155,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 64357,
"vendorcode": "19317155",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "11.237.189.35",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t11.237.189.35\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.237.189.35","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-01-30T21:47:19.656Z","agent":{"ephemeral_id":"d5c90a24-63ef-4bb5-b4a3-7ba128b949db","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-01-30T21:47:20.833Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tBACKOFFICE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tCCCC-TFK2\n\tSource Network Address:\t11.237.189.35\n\tSource Port:\t\t64357\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.237.189.35","IpPort":"64357","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"BACKOFFICE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"CCCC-TFK2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":2732}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":19317155,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: BODC1.backoffice.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 64357
vendorcode: 19317155
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 11.237.189.35
userName: fish | Explain this syslog message |
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=247.121.30.107 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=106.230.199.100 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=106.230.199.100 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleType:GLOBAL",
"barracuda_waf",
"ProxyIP:173.231.60.196",
"REMOTE_FILE_INCLUSION",
"cef",
"FollowUpAction:NONE",
"barracuda_waf_REMOTE_FILE_INCLUSION",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=247.121.30.107 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/\"] duser=\"-\" src=106.230.199.100 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)\" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=106.230.199.100 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1660728184600 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "REMOTE_FILE_INCLUSION",
"severitycode": 9,
"fqdn": "/comm/AndarTrack.jsp",
"clientport": 40194,
"vendorcode": "164",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "106.230.199.100",
"serverIP": "247.121.30.107",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=247.121.30.107 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=106.230.199.100 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=106.230.199.100 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=247.121.30.107 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=106.230.199.100 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=106.230.199.100 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleType:GLOBAL', 'barracuda_waf', 'ProxyIP:173.231.60.196', 'REMOTE_FILE_INCLUSION', 'cef', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1660728184600
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: REMOTE_FILE_INCLUSION
severitycode: 9
fqdn: /comm/AndarTrack.jsp
clientport: 40194
vendorcode: 164
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 106.230.199.100
serverIP: 247.121.30.107
userName: - | Explain this syslog message |
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=35.238.40.206 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=61.141.124.188 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=61.141.124.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleType:GLOBAL",
"barracuda_waf",
"ProxyIP:173.231.60.196",
"REMOTE_FILE_INCLUSION",
"cef",
"FollowUpAction:NONE",
"barracuda_waf_REMOTE_FILE_INCLUSION",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=35.238.40.206 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/\"] duser=\"-\" src=61.141.124.188 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)\" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=61.141.124.188 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1660728184600 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "REMOTE_FILE_INCLUSION",
"severitycode": 9,
"fqdn": "/comm/AndarTrack.jsp",
"clientport": 40194,
"vendorcode": "164",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "61.141.124.188",
"serverIP": "35.238.40.206",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=35.238.40.206 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=61.141.124.188 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=61.141.124.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=35.238.40.206 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=61.141.124.188 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=61.141.124.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleType:GLOBAL', 'barracuda_waf', 'ProxyIP:173.231.60.196', 'REMOTE_FILE_INCLUSION', 'cef', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1660728184600
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: REMOTE_FILE_INCLUSION
severitycode: 9
fqdn: /comm/AndarTrack.jsp
clientport: 40194
vendorcode: 164
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 61.141.124.188
serverIP: 35.238.40.206
userName: - | Explain this syslog message |
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=182.167.106.55 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=122.45.107.234 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=122.45.107.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleType:GLOBAL",
"barracuda_waf",
"ProxyIP:173.231.60.196",
"REMOTE_FILE_INCLUSION",
"cef",
"FollowUpAction:NONE",
"barracuda_waf_REMOTE_FILE_INCLUSION",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=182.167.106.55 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/\"] duser=\"-\" src=122.45.107.234 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)\" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=122.45.107.234 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1660728184600 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "REMOTE_FILE_INCLUSION",
"severitycode": 9,
"fqdn": "/comm/AndarTrack.jsp",
"clientport": 40194,
"vendorcode": "164",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "122.45.107.234",
"serverIP": "182.167.106.55",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=182.167.106.55 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=122.45.107.234 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=122.45.107.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=182.167.106.55 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=122.45.107.234 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=122.45.107.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleType:GLOBAL', 'barracuda_waf', 'ProxyIP:173.231.60.196', 'REMOTE_FILE_INCLUSION', 'cef', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1660728184600
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: REMOTE_FILE_INCLUSION
severitycode: 9
fqdn: /comm/AndarTrack.jsp
clientport: 40194
vendorcode: 164
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 122.45.107.234
serverIP: 182.167.106.55
userName: - | Explain this syslog message |
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=127.78.75.37 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=13.135.212.23 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=13.135.212.23 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleType:GLOBAL",
"barracuda_waf",
"ProxyIP:173.231.60.196",
"REMOTE_FILE_INCLUSION",
"cef",
"FollowUpAction:NONE",
"barracuda_waf_REMOTE_FILE_INCLUSION",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=127.78.75.37 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/\"] duser=\"-\" src=13.135.212.23 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)\" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=13.135.212.23 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1660728184600 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "REMOTE_FILE_INCLUSION",
"severitycode": 9,
"fqdn": "/comm/AndarTrack.jsp",
"clientport": 40194,
"vendorcode": "164",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "13.135.212.23",
"serverIP": "127.78.75.37",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=127.78.75.37 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=13.135.212.23 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=13.135.212.23 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 17 04:23:04 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=127.78.75.37 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/early-learning-pre-k-forum-focuses-on-expansion/"] duser="-" src=13.135.212.23 spt=40194 requestMethod=GET app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/ start=Aug 17 2022 04:23:04 rt=1660728184600 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (compatible; Adsbot/3.1; +https://seostar.co/robot/)" dvchost=WAFirewall externalId=182ab1d0f18-b49978ff cn2=40194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=13.135.212.23 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleType:GLOBAL', 'barracuda_waf', 'ProxyIP:173.231.60.196', 'REMOTE_FILE_INCLUSION', 'cef', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1660728184600
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: REMOTE_FILE_INCLUSION
severitycode: 9
fqdn: /comm/AndarTrack.jsp
clientport: 40194
vendorcode: 164
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 13.135.212.23
serverIP: 127.78.75.37
userName: - | Explain this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"235.122.159.41","externalIp":"57.173.97.227","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=235.122.159.41 ::: serverIP=57.173.97.227 ::: userName=alice ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-13T06:02:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"235.122.159.41\",\"externalIp\":\"57.173.97.227\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:02:58.000Z\"} ::: clientIP=235.122.159.41 ::: serverIP=57.173.97.227 ::: userName=alice ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "bit.ly",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "bit.ly",
"vendorcode": "URL ShortenersApplicationCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "235.122.159.41",
"serverIP": "57.173.97.227",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"235.122.159.41","externalIp":"57.173.97.227","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=235.122.159.41 ::: serverIP=57.173.97.227 ::: userName=alice ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"235.122.159.41","externalIp":"57.173.97.227","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=235.122.159.41 ::: serverIP=57.173.97.227 ::: userName=alice ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-13T06:02:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: bit.ly
messagetype: firewall_action
severitycode: 2
fqdn: bit.ly
vendorcode: URL ShortenersApplicationCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 235.122.159.41
serverIP: 57.173.97.227
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"254.235.8.28","externalIp":"150.95.33.130","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=254.235.8.28 ::: serverIP=150.95.33.130 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-13T06:02:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"254.235.8.28\",\"externalIp\":\"150.95.33.130\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:02:58.000Z\"} ::: clientIP=254.235.8.28 ::: serverIP=150.95.33.130 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "bit.ly",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "bit.ly",
"vendorcode": "URL ShortenersApplicationCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "254.235.8.28",
"serverIP": "150.95.33.130",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"254.235.8.28","externalIp":"150.95.33.130","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=254.235.8.28 ::: serverIP=150.95.33.130 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"254.235.8.28","externalIp":"150.95.33.130","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=254.235.8.28 ::: serverIP=150.95.33.130 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-13T06:02:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: bit.ly
messagetype: firewall_action
severitycode: 2
fqdn: bit.ly
vendorcode: URL ShortenersApplicationCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 254.235.8.28
serverIP: 150.95.33.130
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"142.151.105.85","externalIp":"217.44.111.187","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=142.151.105.85 ::: serverIP=217.44.111.187 ::: userName=janedoe ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-13T05:26:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"142.151.105.85\",\"externalIp\":\"217.44.111.187\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T05:26:58.000Z\"} ::: clientIP=142.151.105.85 ::: serverIP=217.44.111.187 ::: userName=janedoe ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "bit.ly",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "bit.ly",
"vendorcode": "URL ShortenersApplicationCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "142.151.105.85",
"serverIP": "217.44.111.187",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"142.151.105.85","externalIp":"217.44.111.187","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=142.151.105.85 ::: serverIP=217.44.111.187 ::: userName=janedoe ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"142.151.105.85","externalIp":"217.44.111.187","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=142.151.105.85 ::: serverIP=217.44.111.187 ::: userName=janedoe ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-13T05:26:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: bit.ly
messagetype: firewall_action
severitycode: 2
fqdn: bit.ly
vendorcode: URL ShortenersApplicationCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 142.151.105.85
serverIP: 217.44.111.187
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"59.55.178.170","externalIp":"74.178.43.38","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=59.55.178.170 ::: serverIP=74.178.43.38 ::: userName=fish ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-13T05:26:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"59.55.178.170\",\"externalIp\":\"74.178.43.38\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T05:26:58.000Z\"} ::: clientIP=59.55.178.170 ::: serverIP=74.178.43.38 ::: userName=fish ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "bit.ly",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "bit.ly",
"vendorcode": "URL ShortenersApplicationCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "59.55.178.170",
"serverIP": "74.178.43.38",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"59.55.178.170","externalIp":"74.178.43.38","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=59.55.178.170 ::: serverIP=74.178.43.38 ::: userName=fish ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"59.55.178.170","externalIp":"74.178.43.38","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=59.55.178.170 ::: serverIP=74.178.43.38 ::: userName=fish ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-13T05:26:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: bit.ly
messagetype: firewall_action
severitycode: 2
fqdn: bit.ly
vendorcode: URL ShortenersApplicationCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 59.55.178.170
serverIP: 74.178.43.38
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"239.238.11.133","externalIp":"152.45.42.222","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=239.238.11.133 ::: serverIP=152.45.42.222 ::: userName=charlie ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-29T19:11:24.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"239.238.11.133\",\"externalIp\":\"152.45.42.222\",\"categories\":[\"Malware\",\"File Transfer Services\"],\"tags\":[],\"destination\":\"my.mixtape.moe\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-29T19:11:24.000Z\"} ::: clientIP=239.238.11.133 ::: serverIP=152.45.42.222 ::: userName=charlie ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "my.mixtape.moe",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "my.mixtape.moe",
"vendorcode": "MalwareFile Transfer Services",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "239.238.11.133",
"serverIP": "152.45.42.222",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"239.238.11.133","externalIp":"152.45.42.222","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=239.238.11.133 ::: serverIP=152.45.42.222 ::: userName=charlie ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"239.238.11.133","externalIp":"152.45.42.222","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=239.238.11.133 ::: serverIP=152.45.42.222 ::: userName=charlie ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-29T19:11:24.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: my.mixtape.moe
messagetype: firewall_action
severitycode: 2
fqdn: my.mixtape.moe
vendorcode: MalwareFile Transfer Services
action: block
streamName: OpenDNS Detection
clientIP: 239.238.11.133
serverIP: 152.45.42.222
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"79.204.184.180","externalIp":"124.48.160.170","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=79.204.184.180 ::: serverIP=124.48.160.170 ::: userName=alice ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-29T19:11:24.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"79.204.184.180\",\"externalIp\":\"124.48.160.170\",\"categories\":[\"Malware\",\"File Transfer Services\"],\"tags\":[],\"destination\":\"my.mixtape.moe\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-29T19:11:24.000Z\"} ::: clientIP=79.204.184.180 ::: serverIP=124.48.160.170 ::: userName=alice ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "my.mixtape.moe",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "my.mixtape.moe",
"vendorcode": "MalwareFile Transfer Services",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "79.204.184.180",
"serverIP": "124.48.160.170",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"79.204.184.180","externalIp":"124.48.160.170","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=79.204.184.180 ::: serverIP=124.48.160.170 ::: userName=alice ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"79.204.184.180","externalIp":"124.48.160.170","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=79.204.184.180 ::: serverIP=124.48.160.170 ::: userName=alice ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-29T19:11:24.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: my.mixtape.moe
messagetype: firewall_action
severitycode: 2
fqdn: my.mixtape.moe
vendorcode: MalwareFile Transfer Services
action: block
streamName: OpenDNS Detection
clientIP: 79.204.184.180
serverIP: 124.48.160.170
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"230.143.11.239","externalIp":"240.96.225.58","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=230.143.11.239 ::: serverIP=240.96.225.58 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-13T06:02:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"230.143.11.239\",\"externalIp\":\"240.96.225.58\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:02:58.000Z\"} ::: clientIP=230.143.11.239 ::: serverIP=240.96.225.58 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "bit.ly",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "bit.ly",
"vendorcode": "URL ShortenersApplicationCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "230.143.11.239",
"serverIP": "240.96.225.58",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"230.143.11.239","externalIp":"240.96.225.58","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=230.143.11.239 ::: serverIP=240.96.225.58 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"230.143.11.239","externalIp":"240.96.225.58","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=230.143.11.239 ::: serverIP=240.96.225.58 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-13T06:02:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: bit.ly
messagetype: firewall_action
severitycode: 2
fqdn: bit.ly
vendorcode: URL ShortenersApplicationCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 230.143.11.239
serverIP: 240.96.225.58
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"75.109.99.194","externalIp":"31.103.186.230","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=75.109.99.194 ::: serverIP=31.103.186.230 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-13T06:02:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"75.109.99.194\",\"externalIp\":\"31.103.186.230\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:02:58.000Z\"} ::: clientIP=75.109.99.194 ::: serverIP=31.103.186.230 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "bit.ly",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "bit.ly",
"vendorcode": "URL ShortenersApplicationCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "75.109.99.194",
"serverIP": "31.103.186.230",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"75.109.99.194","externalIp":"31.103.186.230","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=75.109.99.194 ::: serverIP=31.103.186.230 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"75.109.99.194","externalIp":"31.103.186.230","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:02:58.000Z"} ::: clientIP=75.109.99.194 ::: serverIP=31.103.186.230 ::: userName=johndoe ::: created_at=2022-05-13T06:02:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:02:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-13T06:02:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: bit.ly
messagetype: firewall_action
severitycode: 2
fqdn: bit.ly
vendorcode: URL ShortenersApplicationCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 75.109.99.194
serverIP: 31.103.186.230
userName: johndoe | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.