input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"251.28.8.163","externalIp":"95.250.230.12","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=251.28.8.163 ::: serverIP=95.250.230.12 ::: userName=fish ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-13T05:26:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"251.28.8.163\",\"externalIp\":\"95.250.230.12\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T05:26:58.000Z\"} ::: clientIP=251.28.8.163 ::: serverIP=95.250.230.12 ::: userName=fish ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "bit.ly", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "bit.ly", "vendorcode": "URL ShortenersApplicationCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "251.28.8.163", "serverIP": "95.250.230.12", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"251.28.8.163","externalIp":"95.250.230.12","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=251.28.8.163 ::: serverIP=95.250.230.12 ::: userName=fish ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"251.28.8.163","externalIp":"95.250.230.12","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=251.28.8.163 ::: serverIP=95.250.230.12 ::: userName=fish ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-13T05:26:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: bit.ly messagetype: firewall_action severitycode: 2 fqdn: bit.ly vendorcode: URL ShortenersApplicationCryptomining action: block streamName: OpenDNS Detection clientIP: 251.28.8.163 serverIP: 95.250.230.12 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"54.83.120.105","externalIp":"214.246.102.127","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=54.83.120.105 ::: serverIP=214.246.102.127 ::: userName=alice ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-13T05:26:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"54.83.120.105\",\"externalIp\":\"214.246.102.127\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T05:26:58.000Z\"} ::: clientIP=54.83.120.105 ::: serverIP=214.246.102.127 ::: userName=alice ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "bit.ly", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "bit.ly", "vendorcode": "URL ShortenersApplicationCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "54.83.120.105", "serverIP": "214.246.102.127", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"54.83.120.105","externalIp":"214.246.102.127","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=54.83.120.105 ::: serverIP=214.246.102.127 ::: userName=alice ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"54.83.120.105","externalIp":"214.246.102.127","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=54.83.120.105 ::: serverIP=214.246.102.127 ::: userName=alice ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-13T05:26:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: bit.ly messagetype: firewall_action severitycode: 2 fqdn: bit.ly vendorcode: URL ShortenersApplicationCryptomining action: block streamName: OpenDNS Detection clientIP: 54.83.120.105 serverIP: 214.246.102.127 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"242.224.127.147","externalIp":"222.72.244.95","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=242.224.127.147 ::: serverIP=222.72.244.95 ::: userName=fish ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-13T06:04:43.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"242.224.127.147\",\"externalIp\":\"222.72.244.95\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:04:43.000Z\"} ::: clientIP=242.224.127.147 ::: serverIP=222.72.244.95 ::: userName=fish ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "bit.ly", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "bit.ly", "vendorcode": "URL ShortenersApplicationCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "242.224.127.147", "serverIP": "222.72.244.95", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"242.224.127.147","externalIp":"222.72.244.95","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=242.224.127.147 ::: serverIP=222.72.244.95 ::: userName=fish ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"242.224.127.147","externalIp":"222.72.244.95","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=242.224.127.147 ::: serverIP=222.72.244.95 ::: userName=fish ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-13T06:04:43.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: bit.ly messagetype: firewall_action severitycode: 2 fqdn: bit.ly vendorcode: URL ShortenersApplicationCryptomining action: block streamName: OpenDNS Detection clientIP: 242.224.127.147 serverIP: 222.72.244.95 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"17.2.181.134","externalIp":"163.115.128.9","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=17.2.181.134 ::: serverIP=163.115.128.9 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-13T06:04:43.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"17.2.181.134\",\"externalIp\":\"163.115.128.9\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:04:43.000Z\"} ::: clientIP=17.2.181.134 ::: serverIP=163.115.128.9 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "bit.ly", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "bit.ly", "vendorcode": "URL ShortenersApplicationCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "17.2.181.134", "serverIP": "163.115.128.9", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"17.2.181.134","externalIp":"163.115.128.9","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=17.2.181.134 ::: serverIP=163.115.128.9 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"17.2.181.134","externalIp":"163.115.128.9","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=17.2.181.134 ::: serverIP=163.115.128.9 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-13T06:04:43.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: bit.ly messagetype: firewall_action severitycode: 2 fqdn: bit.ly vendorcode: URL ShortenersApplicationCryptomining action: block streamName: OpenDNS Detection clientIP: 17.2.181.134 serverIP: 163.115.128.9 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"77.56.235.47","externalIp":"230.134.179.242","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=77.56.235.47 ::: serverIP=230.134.179.242 ::: userName=bob ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-29T19:11:24.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"77.56.235.47\",\"externalIp\":\"230.134.179.242\",\"categories\":[\"Malware\",\"File Transfer Services\"],\"tags\":[],\"destination\":\"my.mixtape.moe\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-29T19:11:24.000Z\"} ::: clientIP=77.56.235.47 ::: serverIP=230.134.179.242 ::: userName=bob ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "my.mixtape.moe", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "my.mixtape.moe", "vendorcode": "MalwareFile Transfer Services", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "77.56.235.47", "serverIP": "230.134.179.242", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"77.56.235.47","externalIp":"230.134.179.242","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=77.56.235.47 ::: serverIP=230.134.179.242 ::: userName=bob ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"77.56.235.47","externalIp":"230.134.179.242","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=77.56.235.47 ::: serverIP=230.134.179.242 ::: userName=bob ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-29T19:11:24.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: my.mixtape.moe messagetype: firewall_action severitycode: 2 fqdn: my.mixtape.moe vendorcode: MalwareFile Transfer Services action: block streamName: OpenDNS Detection clientIP: 77.56.235.47 serverIP: 230.134.179.242 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"197.96.251.231","externalIp":"46.195.213.120","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=197.96.251.231 ::: serverIP=46.195.213.120 ::: userName=johndoe ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-29T19:11:24.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"197.96.251.231\",\"externalIp\":\"46.195.213.120\",\"categories\":[\"Malware\",\"File Transfer Services\"],\"tags\":[],\"destination\":\"my.mixtape.moe\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-29T19:11:24.000Z\"} ::: clientIP=197.96.251.231 ::: serverIP=46.195.213.120 ::: userName=johndoe ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "my.mixtape.moe", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "my.mixtape.moe", "vendorcode": "MalwareFile Transfer Services", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "197.96.251.231", "serverIP": "46.195.213.120", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"197.96.251.231","externalIp":"46.195.213.120","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=197.96.251.231 ::: serverIP=46.195.213.120 ::: userName=johndoe ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"197.96.251.231","externalIp":"46.195.213.120","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=197.96.251.231 ::: serverIP=46.195.213.120 ::: userName=johndoe ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-29T19:11:24.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: my.mixtape.moe messagetype: firewall_action severitycode: 2 fqdn: my.mixtape.moe vendorcode: MalwareFile Transfer Services action: block streamName: OpenDNS Detection clientIP: 197.96.251.231 serverIP: 46.195.213.120 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"173.71.184.139","externalIp":"253.20.97.218","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=173.71.184.139 ::: serverIP=253.20.97.218 ::: userName=fish ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-13T06:04:43.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"173.71.184.139\",\"externalIp\":\"253.20.97.218\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:04:43.000Z\"} ::: clientIP=173.71.184.139 ::: serverIP=253.20.97.218 ::: userName=fish ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "bit.ly", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "bit.ly", "vendorcode": "URL ShortenersApplicationCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "173.71.184.139", "serverIP": "253.20.97.218", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"173.71.184.139","externalIp":"253.20.97.218","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=173.71.184.139 ::: serverIP=253.20.97.218 ::: userName=fish ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"173.71.184.139","externalIp":"253.20.97.218","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=173.71.184.139 ::: serverIP=253.20.97.218 ::: userName=fish ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-13T06:04:43.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: bit.ly messagetype: firewall_action severitycode: 2 fqdn: bit.ly vendorcode: URL ShortenersApplicationCryptomining action: block streamName: OpenDNS Detection clientIP: 173.71.184.139 serverIP: 253.20.97.218 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"107.28.70.130","externalIp":"230.151.96.245","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=107.28.70.130 ::: serverIP=230.151.96.245 ::: userName=alice ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-13T06:04:43.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"107.28.70.130\",\"externalIp\":\"230.151.96.245\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:04:43.000Z\"} ::: clientIP=107.28.70.130 ::: serverIP=230.151.96.245 ::: userName=alice ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "bit.ly", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "bit.ly", "vendorcode": "URL ShortenersApplicationCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "107.28.70.130", "serverIP": "230.151.96.245", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"107.28.70.130","externalIp":"230.151.96.245","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=107.28.70.130 ::: serverIP=230.151.96.245 ::: userName=alice ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"107.28.70.130","externalIp":"230.151.96.245","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=107.28.70.130 ::: serverIP=230.151.96.245 ::: userName=alice ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-13T06:04:43.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: bit.ly messagetype: firewall_action severitycode: 2 fqdn: bit.ly vendorcode: URL ShortenersApplicationCryptomining action: block streamName: OpenDNS Detection clientIP: 107.28.70.130 serverIP: 230.151.96.245 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"23.153.102.81","externalIp":"25.25.161.37","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=23.153.102.81 ::: serverIP=25.25.161.37 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-13T06:04:43.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"23.153.102.81\",\"externalIp\":\"25.25.161.37\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:04:43.000Z\"} ::: clientIP=23.153.102.81 ::: serverIP=25.25.161.37 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "bit.ly", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "bit.ly", "vendorcode": "URL ShortenersApplicationCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "23.153.102.81", "serverIP": "25.25.161.37", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"23.153.102.81","externalIp":"25.25.161.37","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=23.153.102.81 ::: serverIP=25.25.161.37 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"23.153.102.81","externalIp":"25.25.161.37","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=23.153.102.81 ::: serverIP=25.25.161.37 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-13T06:04:43.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: bit.ly messagetype: firewall_action severitycode: 2 fqdn: bit.ly vendorcode: URL ShortenersApplicationCryptomining action: block streamName: OpenDNS Detection clientIP: 23.153.102.81 serverIP: 25.25.161.37 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"145.222.181.209","externalIp":"2.157.190.27","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=145.222.181.209 ::: serverIP=2.157.190.27 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-13T06:04:43.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"145.222.181.209\",\"externalIp\":\"2.157.190.27\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:04:43.000Z\"} ::: clientIP=145.222.181.209 ::: serverIP=2.157.190.27 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "bit.ly", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "bit.ly", "vendorcode": "URL ShortenersApplicationCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "145.222.181.209", "serverIP": "2.157.190.27", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"145.222.181.209","externalIp":"2.157.190.27","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=145.222.181.209 ::: serverIP=2.157.190.27 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"145.222.181.209","externalIp":"2.157.190.27","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=145.222.181.209 ::: serverIP=2.157.190.27 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-13T06:04:43.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: bit.ly messagetype: firewall_action severitycode: 2 fqdn: bit.ly vendorcode: URL ShortenersApplicationCryptomining action: block streamName: OpenDNS Detection clientIP: 145.222.181.209 serverIP: 2.157.190.27 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"223.214.248.233","externalIp":"189.128.184.225","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=223.214.248.233 ::: serverIP=189.128.184.225 ::: userName=johndoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-23T15:36:48.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"223.214.248.233\",\"externalIp\":\"189.128.184.225\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=223.214.248.233 ::: serverIP=189.128.184.225 ::: userName=johndoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "223.214.248.233", "serverIP": "189.128.184.225", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"223.214.248.233","externalIp":"189.128.184.225","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=223.214.248.233 ::: serverIP=189.128.184.225 ::: userName=johndoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"223.214.248.233","externalIp":"189.128.184.225","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=223.214.248.233 ::: serverIP=189.128.184.225 ::: userName=johndoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-23T15:36:48.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 223.214.248.233 serverIP: 189.128.184.225 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"149.35.135.83","externalIp":"197.213.156.108","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=149.35.135.83 ::: serverIP=197.213.156.108 ::: userName=alice ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-23T15:36:48.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"149.35.135.83\",\"externalIp\":\"197.213.156.108\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=149.35.135.83 ::: serverIP=197.213.156.108 ::: userName=alice ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "149.35.135.83", "serverIP": "197.213.156.108", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"149.35.135.83","externalIp":"197.213.156.108","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=149.35.135.83 ::: serverIP=197.213.156.108 ::: userName=alice ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"149.35.135.83","externalIp":"197.213.156.108","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=149.35.135.83 ::: serverIP=197.213.156.108 ::: userName=alice ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-23T15:36:48.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 149.35.135.83 serverIP: 197.213.156.108 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"191.84.59.224","externalIp":"113.74.205.36","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=191.84.59.224 ::: serverIP=113.74.205.36 ::: userName=alice ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-23T15:36:48.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"191.84.59.224\",\"externalIp\":\"113.74.205.36\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=191.84.59.224 ::: serverIP=113.74.205.36 ::: userName=alice ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "191.84.59.224", "serverIP": "113.74.205.36", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"191.84.59.224","externalIp":"113.74.205.36","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=191.84.59.224 ::: serverIP=113.74.205.36 ::: userName=alice ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"191.84.59.224","externalIp":"113.74.205.36","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=191.84.59.224 ::: serverIP=113.74.205.36 ::: userName=alice ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-23T15:36:48.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 191.84.59.224 serverIP: 113.74.205.36 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"14.133.113.202","externalIp":"47.34.159.131","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=14.133.113.202 ::: serverIP=47.34.159.131 ::: userName=fish ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-23T15:36:48.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"14.133.113.202\",\"externalIp\":\"47.34.159.131\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=14.133.113.202 ::: serverIP=47.34.159.131 ::: userName=fish ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "14.133.113.202", "serverIP": "47.34.159.131", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"14.133.113.202","externalIp":"47.34.159.131","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=14.133.113.202 ::: serverIP=47.34.159.131 ::: userName=fish ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"14.133.113.202","externalIp":"47.34.159.131","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=14.133.113.202 ::: serverIP=47.34.159.131 ::: userName=fish ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-23T15:36:48.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 14.133.113.202 serverIP: 47.34.159.131 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"63.159.20.225","externalIp":"84.100.229.127","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=63.159.20.225 ::: serverIP=84.100.229.127 ::: userName=janedoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-23T15:36:48.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"63.159.20.225\",\"externalIp\":\"84.100.229.127\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=63.159.20.225 ::: serverIP=84.100.229.127 ::: userName=janedoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "63.159.20.225", "serverIP": "84.100.229.127", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"63.159.20.225","externalIp":"84.100.229.127","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=63.159.20.225 ::: serverIP=84.100.229.127 ::: userName=janedoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"63.159.20.225","externalIp":"84.100.229.127","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=63.159.20.225 ::: serverIP=84.100.229.127 ::: userName=janedoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-23T15:36:48.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 63.159.20.225 serverIP: 84.100.229.127 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"49.214.51.11","externalIp":"237.3.64.165","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=49.214.51.11 ::: serverIP=237.3.64.165 ::: userName=janedoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-23T15:36:48.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"49.214.51.11\",\"externalIp\":\"237.3.64.165\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=49.214.51.11 ::: serverIP=237.3.64.165 ::: userName=janedoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "49.214.51.11", "serverIP": "237.3.64.165", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"49.214.51.11","externalIp":"237.3.64.165","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=49.214.51.11 ::: serverIP=237.3.64.165 ::: userName=janedoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"49.214.51.11","externalIp":"237.3.64.165","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=49.214.51.11 ::: serverIP=237.3.64.165 ::: userName=janedoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-23T15:36:48.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 49.214.51.11 serverIP: 237.3.64.165 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"167.112.185.114","externalIp":"52.29.228.20","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=167.112.185.114 ::: serverIP=52.29.228.20 ::: userName=bob ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-23T15:36:48.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"167.112.185.114\",\"externalIp\":\"52.29.228.20\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=167.112.185.114 ::: serverIP=52.29.228.20 ::: userName=bob ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "167.112.185.114", "serverIP": "52.29.228.20", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"167.112.185.114","externalIp":"52.29.228.20","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=167.112.185.114 ::: serverIP=52.29.228.20 ::: userName=bob ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"167.112.185.114","externalIp":"52.29.228.20","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=167.112.185.114 ::: serverIP=52.29.228.20 ::: userName=bob ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-23T15:36:48.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 167.112.185.114 serverIP: 52.29.228.20 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"93.96.3.108","externalIp":"43.89.105.38","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=93.96.3.108 ::: serverIP=43.89.105.38 ::: userName=nighthawk ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-23T15:36:48.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"93.96.3.108\",\"externalIp\":\"43.89.105.38\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=93.96.3.108 ::: serverIP=43.89.105.38 ::: userName=nighthawk ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "93.96.3.108", "serverIP": "43.89.105.38", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"93.96.3.108","externalIp":"43.89.105.38","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=93.96.3.108 ::: serverIP=43.89.105.38 ::: userName=nighthawk ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"93.96.3.108","externalIp":"43.89.105.38","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=93.96.3.108 ::: serverIP=43.89.105.38 ::: userName=nighthawk ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-23T15:36:48.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 93.96.3.108 serverIP: 43.89.105.38 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"52.35.152.243","externalIp":"97.221.56.158","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=52.35.152.243 ::: serverIP=97.221.56.158 ::: userName=fish ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-23T15:36:48.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"52.35.152.243\",\"externalIp\":\"97.221.56.158\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=52.35.152.243 ::: serverIP=97.221.56.158 ::: userName=fish ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "52.35.152.243", "serverIP": "97.221.56.158", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"52.35.152.243","externalIp":"97.221.56.158","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=52.35.152.243 ::: serverIP=97.221.56.158 ::: userName=fish ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"52.35.152.243","externalIp":"97.221.56.158","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=52.35.152.243 ::: serverIP=97.221.56.158 ::: userName=fish ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-23T15:36:48.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 52.35.152.243 serverIP: 97.221.56.158 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"86.97.44.169","externalIp":"141.120.195.207","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=86.97.44.169 ::: serverIP=141.120.195.207 ::: userName=bob ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-23T15:36:48.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"86.97.44.169\",\"externalIp\":\"141.120.195.207\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=86.97.44.169 ::: serverIP=141.120.195.207 ::: userName=bob ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "86.97.44.169", "serverIP": "141.120.195.207", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"86.97.44.169","externalIp":"141.120.195.207","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=86.97.44.169 ::: serverIP=141.120.195.207 ::: userName=bob ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"86.97.44.169","externalIp":"141.120.195.207","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=86.97.44.169 ::: serverIP=141.120.195.207 ::: userName=bob ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-23T15:36:48.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 86.97.44.169 serverIP: 141.120.195.207 userName: bob
Explain this syslog message
<172>Feb 01 2023 17:29:28 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:216.187.57.163/55275 dst outside:92.154.108.71/7680 by access-group "inside"
{ "priority": 172, "senderhost": "10.52.255.1", "serverport": 7680, "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 01 2023 17:29:28 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:216.187.57.163/55275 dst outside:92.154.108.71/7680 by access-group \"inside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 55275, "vendorcode": "PIX-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "216.187.57.163", "serverIP": "92.154.108.71" }
Create a JSON artifact from the message
<172>Feb 01 2023 17:29:28 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:216.187.57.163/55275 dst outside:92.154.108.71/7680 by access-group "inside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 01 2023 17:29:28 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:216.187.57.163/55275 dst outside:92.154.108.71/7680 by access-group "inside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 serverport: 7680 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 55275 vendorcode: PIX-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_pix clientIP: 216.187.57.163 serverIP: 92.154.108.71
Explain this syslog message
<172>Feb 01 2023 17:29:28 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:46.199.164.157/55275 dst outside:188.8.91.199/7680 by access-group "inside"
{ "priority": 172, "senderhost": "10.52.255.1", "serverport": 7680, "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 01 2023 17:29:28 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:46.199.164.157/55275 dst outside:188.8.91.199/7680 by access-group \"inside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 55275, "vendorcode": "PIX-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "46.199.164.157", "serverIP": "188.8.91.199" }
Create a JSON artifact from the message
<172>Feb 01 2023 17:29:28 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:46.199.164.157/55275 dst outside:188.8.91.199/7680 by access-group "inside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 01 2023 17:29:28 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:46.199.164.157/55275 dst outside:188.8.91.199/7680 by access-group "inside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 serverport: 7680 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 55275 vendorcode: PIX-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_pix clientIP: 46.199.164.157 serverIP: 188.8.91.199
Explain this syslog message
<185>Sep 2 20:07:36 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=253.140.110.21 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=31.184.30.132 spt=59304 requestMethod=GET app=HTTP requestContext="-" start=Sep 02 2023 20:07:36 rt=1693703256614 request=/ requestClientApplication="Mozilla/5.0 (X11; U; Linux x86_64; en-us) AppleWebKit/534.35 (KHTML, like Gecko) Chrome/11.0.696.65 Safari/534.35 Puffin/2.9174AT" dvchost=WAFirewall externalId=18a5894b9ee-b3c3a3e9 cn2=59304 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=31.184.30.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 59304, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1693703256614 ", "message": "<185>Sep 2 20:07:36 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=253.140.110.21 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=31.184.30.132 spt=59304 requestMethod=GET app=HTTP requestContext=\"-\" start=Sep 02 2023 20:07:36 rt=1693703256614 request=/ requestClientApplication=\"Mozilla/5.0 (X11; U; Linux x86_64; en-us) AppleWebKit/534.35 (KHTML, like Gecko) Chrome/11.0.696.65 Safari/534.35 Puffin/2.9174AT\" dvchost=WAFirewall externalId=18a5894b9ee-b3c3a3e9 cn2=59304 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=31.184.30.132 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:79.124.49.10", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "31.184.30.132", "serverIP": "253.140.110.21", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 2 20:07:36 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=253.140.110.21 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=31.184.30.132 spt=59304 requestMethod=GET app=HTTP requestContext="-" start=Sep 02 2023 20:07:36 rt=1693703256614 request=/ requestClientApplication="Mozilla/5.0 (X11; U; Linux x86_64; en-us) AppleWebKit/534.35 (KHTML, like Gecko) Chrome/11.0.696.65 Safari/534.35 Puffin/2.9174AT" dvchost=WAFirewall externalId=18a5894b9ee-b3c3a3e9 cn2=59304 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=31.184.30.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 2 20:07:36 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=253.140.110.21 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=31.184.30.132 spt=59304 requestMethod=GET app=HTTP requestContext="-" start=Sep 02 2023 20:07:36 rt=1693703256614 request=/ requestClientApplication="Mozilla/5.0 (X11; U; Linux x86_64; en-us) AppleWebKit/534.35 (KHTML, like Gecko) Chrome/11.0.696.65 Safari/534.35 Puffin/2.9174AT" dvchost=WAFirewall externalId=18a5894b9ee-b3c3a3e9 cn2=59304 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=31.184.30.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 59304 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1693703256614 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:79.124.49.10', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 31.184.30.132 serverIP: 253.140.110.21 userName: -
Explain this syslog message
<185>Sep 2 20:07:36 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=48.11.200.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=244.251.249.246 spt=59304 requestMethod=GET app=HTTP requestContext="-" start=Sep 02 2023 20:07:36 rt=1693703256614 request=/ requestClientApplication="Mozilla/5.0 (X11; U; Linux x86_64; en-us) AppleWebKit/534.35 (KHTML, like Gecko) Chrome/11.0.696.65 Safari/534.35 Puffin/2.9174AT" dvchost=WAFirewall externalId=18a5894b9ee-b3c3a3e9 cn2=59304 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=244.251.249.246 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 59304, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1693703256614 ", "message": "<185>Sep 2 20:07:36 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=48.11.200.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=244.251.249.246 spt=59304 requestMethod=GET app=HTTP requestContext=\"-\" start=Sep 02 2023 20:07:36 rt=1693703256614 request=/ requestClientApplication=\"Mozilla/5.0 (X11; U; Linux x86_64; en-us) AppleWebKit/534.35 (KHTML, like Gecko) Chrome/11.0.696.65 Safari/534.35 Puffin/2.9174AT\" dvchost=WAFirewall externalId=18a5894b9ee-b3c3a3e9 cn2=59304 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=244.251.249.246 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:79.124.49.10", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "244.251.249.246", "serverIP": "48.11.200.212", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 2 20:07:36 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=48.11.200.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=244.251.249.246 spt=59304 requestMethod=GET app=HTTP requestContext="-" start=Sep 02 2023 20:07:36 rt=1693703256614 request=/ requestClientApplication="Mozilla/5.0 (X11; U; Linux x86_64; en-us) AppleWebKit/534.35 (KHTML, like Gecko) Chrome/11.0.696.65 Safari/534.35 Puffin/2.9174AT" dvchost=WAFirewall externalId=18a5894b9ee-b3c3a3e9 cn2=59304 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=244.251.249.246 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 2 20:07:36 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=48.11.200.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=244.251.249.246 spt=59304 requestMethod=GET app=HTTP requestContext="-" start=Sep 02 2023 20:07:36 rt=1693703256614 request=/ requestClientApplication="Mozilla/5.0 (X11; U; Linux x86_64; en-us) AppleWebKit/534.35 (KHTML, like Gecko) Chrome/11.0.696.65 Safari/534.35 Puffin/2.9174AT" dvchost=WAFirewall externalId=18a5894b9ee-b3c3a3e9 cn2=59304 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=244.251.249.246 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 59304 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1693703256614 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:79.124.49.10', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 244.251.249.246 serverIP: 48.11.200.212 userName: -
Explain this syslog message
<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=209.91.94.100 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=83.253.161.19 spt=54028 requestMethod=GET app=HTTP requestContext="-" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.253.161.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 54028, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1702104138428 ", "message": "<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=209.91.94.100 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=83.253.161.19 spt=54028 requestMethod=GET app=HTTP requestContext=\"-\" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication=\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.253.161.19 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:128.199.46.241", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "83.253.161.19", "serverIP": "209.91.94.100", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=209.91.94.100 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=83.253.161.19 spt=54028 requestMethod=GET app=HTTP requestContext="-" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.253.161.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=209.91.94.100 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=83.253.161.19 spt=54028 requestMethod=GET app=HTTP requestContext="-" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.253.161.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 54028 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1702104138428 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:128.199.46.241', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 83.253.161.19 serverIP: 209.91.94.100 userName: -
Explain this syslog message
<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=234.90.118.148 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=154.51.70.204 spt=54028 requestMethod=GET app=HTTP requestContext="-" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.51.70.204 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 54028, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1702104138428 ", "message": "<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=234.90.118.148 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=154.51.70.204 spt=54028 requestMethod=GET app=HTTP requestContext=\"-\" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication=\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.51.70.204 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:128.199.46.241", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "154.51.70.204", "serverIP": "234.90.118.148", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=234.90.118.148 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=154.51.70.204 spt=54028 requestMethod=GET app=HTTP requestContext="-" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.51.70.204 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=234.90.118.148 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=154.51.70.204 spt=54028 requestMethod=GET app=HTTP requestContext="-" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.51.70.204 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 54028 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1702104138428 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:128.199.46.241', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 154.51.70.204 serverIP: 234.90.118.148 userName: -
Explain this syslog message
<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=44.95.183.23 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=186.123.10.10 spt=54028 requestMethod=GET app=HTTP requestContext="-" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.123.10.10 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 54028, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1702104138428 ", "message": "<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=44.95.183.23 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=186.123.10.10 spt=54028 requestMethod=GET app=HTTP requestContext=\"-\" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication=\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.123.10.10 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:128.199.46.241", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "186.123.10.10", "serverIP": "44.95.183.23", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=44.95.183.23 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=186.123.10.10 spt=54028 requestMethod=GET app=HTTP requestContext="-" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.123.10.10 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=44.95.183.23 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=186.123.10.10 spt=54028 requestMethod=GET app=HTTP requestContext="-" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.123.10.10 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 54028 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1702104138428 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:128.199.46.241', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 186.123.10.10 serverIP: 44.95.183.23 userName: -
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"6e36ac138a7a426fa5d2e4a45da72961","timestamp":"2023-09-18T15:17:55Z","behavior_id":"4748","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4579m -classpath \"zap-2.13.0.jar\" org.zaproxy.zap.ZAP","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","display_name":"Detect OnWrite Adware/PUP Hash","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","severity":30,"confidence":100,"ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\alice\\OWASP ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","user_name":"alice","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","parent_details":{"parent_sha256":"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15","parent_md5":"b6bd7778478740744d9f6b11c367b8be","parent_cmdline":"\"C:\\Program Files\\OWASP\\Zed Attack Proxy\\ZAP.exe\" ","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=202.52.58.57 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: userName=alice ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch
{ "clienthostname": "JBETRO-LT4.undefined", "clientmac": "00ffc0d6f846", "filehash": "e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851", "filename": "javaw.exe", "filepath": "\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"timestamp\":\"2023-09-18T15:17:55Z\",\"behavior_id\":\"4748\",\"filename\":\"javaw.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\Java\\\\jdk-20\\\\bin\\\\javaw.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\Java\\\\jdk-20\\\\bin\\\\javaw.exe\\\" -Xmx4579m -classpath \\\"zap-2.13.0.jar\\\" org.zaproxy.zap.ZAP\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Malware\",\"tactic_id\":\"CSTA0001\",\"technique\":\"PUP\",\"technique_id\":\"CST0013\",\"display_name\":\"Detect OnWrite Adware/PUP Hash\",\"description\":\"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.\",\"severity\":30,\"confidence\":100,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\alice\\\\OWASP ZAP\\\\fuzzers\\\\fuzzdb\\\\web-backdoors\\\\exe\\\\nc.exe\",\"user_name\":\"alice\",\"user_id\":\"S-1-12-1-1960846385-1299844409-3992341668-2149414984\",\"control_graph_id\":\"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352\",\"triggering_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714\",\"sha256\":\"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15\",\"parent_md5\":\"b6bd7778478740744d9f6b11c367b8be\",\"parent_cmdline\":\"\\\"C:\\\\Program Files\\\\OWASP\\\\Zed Attack Proxy\\\\ZAP.exe\\\" \",\"parent_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=202.52.58.57 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe ::: userName=alice ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-09-18T15:17:55Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "202.52.58.57", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"6e36ac138a7a426fa5d2e4a45da72961","timestamp":"2023-09-18T15:17:55Z","behavior_id":"4748","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4579m -classpath \"zap-2.13.0.jar\" org.zaproxy.zap.ZAP","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","display_name":"Detect OnWrite Adware/PUP Hash","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","severity":30,"confidence":100,"ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\alice\\OWASP ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","user_name":"alice","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","parent_details":{"parent_sha256":"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15","parent_md5":"b6bd7778478740744d9f6b11c367b8be","parent_cmdline":"\"C:\\Program Files\\OWASP\\Zed Attack Proxy\\ZAP.exe\" ","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=202.52.58.57 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: userName=alice ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"6e36ac138a7a426fa5d2e4a45da72961","timestamp":"2023-09-18T15:17:55Z","behavior_id":"4748","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4579m -classpath \"zap-2.13.0.jar\" org.zaproxy.zap.ZAP","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","display_name":"Detect OnWrite Adware/PUP Hash","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","severity":30,"confidence":100,"ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\alice\\OWASP ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","user_name":"alice","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","parent_details":{"parent_sha256":"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15","parent_md5":"b6bd7778478740744d9f6b11c367b8be","parent_cmdline":"\"C:\\Program Files\\OWASP\\Zed Attack Proxy\\ZAP.exe\" ","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=202.52.58.57 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: userName=alice ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: JBETRO-LT4.undefined clientmac: 00ffc0d6f846 filehash: e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 filename: javaw.exe filepath: \Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-09-18T15:17:55Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 202.52.58.57 userName: alice
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"6e36ac138a7a426fa5d2e4a45da72961","timestamp":"2023-09-18T15:17:55Z","behavior_id":"4748","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4579m -classpath \"zap-2.13.0.jar\" org.zaproxy.zap.ZAP","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","display_name":"Detect OnWrite Adware/PUP Hash","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","severity":30,"confidence":100,"ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\johndoe\\OWASP ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","user_name":"johndoe","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","parent_details":{"parent_sha256":"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15","parent_md5":"b6bd7778478740744d9f6b11c367b8be","parent_cmdline":"\"C:\\Program Files\\OWASP\\Zed Attack Proxy\\ZAP.exe\" ","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=245.58.115.189 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: userName=johndoe ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch
{ "clienthostname": "JBETRO-LT4.undefined", "clientmac": "00ffc0d6f846", "filehash": "e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851", "filename": "javaw.exe", "filepath": "\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"timestamp\":\"2023-09-18T15:17:55Z\",\"behavior_id\":\"4748\",\"filename\":\"javaw.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\Java\\\\jdk-20\\\\bin\\\\javaw.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\Java\\\\jdk-20\\\\bin\\\\javaw.exe\\\" -Xmx4579m -classpath \\\"zap-2.13.0.jar\\\" org.zaproxy.zap.ZAP\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Malware\",\"tactic_id\":\"CSTA0001\",\"technique\":\"PUP\",\"technique_id\":\"CST0013\",\"display_name\":\"Detect OnWrite Adware/PUP Hash\",\"description\":\"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.\",\"severity\":30,\"confidence\":100,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\johndoe\\\\OWASP ZAP\\\\fuzzers\\\\fuzzdb\\\\web-backdoors\\\\exe\\\\nc.exe\",\"user_name\":\"johndoe\",\"user_id\":\"S-1-12-1-1960846385-1299844409-3992341668-2149414984\",\"control_graph_id\":\"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352\",\"triggering_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714\",\"sha256\":\"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15\",\"parent_md5\":\"b6bd7778478740744d9f6b11c367b8be\",\"parent_cmdline\":\"\\\"C:\\\\Program Files\\\\OWASP\\\\Zed Attack Proxy\\\\ZAP.exe\\\" \",\"parent_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=245.58.115.189 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe ::: userName=johndoe ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-09-18T15:17:55Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "245.58.115.189", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"6e36ac138a7a426fa5d2e4a45da72961","timestamp":"2023-09-18T15:17:55Z","behavior_id":"4748","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4579m -classpath \"zap-2.13.0.jar\" org.zaproxy.zap.ZAP","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","display_name":"Detect OnWrite Adware/PUP Hash","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","severity":30,"confidence":100,"ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\johndoe\\OWASP ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","user_name":"johndoe","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","parent_details":{"parent_sha256":"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15","parent_md5":"b6bd7778478740744d9f6b11c367b8be","parent_cmdline":"\"C:\\Program Files\\OWASP\\Zed Attack Proxy\\ZAP.exe\" ","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=245.58.115.189 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: userName=johndoe ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"6e36ac138a7a426fa5d2e4a45da72961","timestamp":"2023-09-18T15:17:55Z","behavior_id":"4748","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4579m -classpath \"zap-2.13.0.jar\" org.zaproxy.zap.ZAP","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","display_name":"Detect OnWrite Adware/PUP Hash","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","severity":30,"confidence":100,"ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\johndoe\\OWASP ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","user_name":"johndoe","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","parent_details":{"parent_sha256":"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15","parent_md5":"b6bd7778478740744d9f6b11c367b8be","parent_cmdline":"\"C:\\Program Files\\OWASP\\Zed Attack Proxy\\ZAP.exe\" ","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=245.58.115.189 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: userName=johndoe ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: JBETRO-LT4.undefined clientmac: 00ffc0d6f846 filehash: e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 filename: javaw.exe filepath: \Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-09-18T15:17:55Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 245.58.115.189 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"6e36ac138a7a426fa5d2e4a45da72961","timestamp":"2023-09-18T15:17:55Z","behavior_id":"4748","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4579m -classpath \"zap-2.13.0.jar\" org.zaproxy.zap.ZAP","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","display_name":"Detect OnWrite Adware/PUP Hash","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","severity":30,"confidence":100,"ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\bob\\OWASP ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","user_name":"bob","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","parent_details":{"parent_sha256":"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15","parent_md5":"b6bd7778478740744d9f6b11c367b8be","parent_cmdline":"\"C:\\Program Files\\OWASP\\Zed Attack Proxy\\ZAP.exe\" ","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=246.7.137.52 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: userName=bob ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch
{ "clienthostname": "JBETRO-LT4.undefined", "clientmac": "00ffc0d6f846", "filehash": "e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851", "filename": "javaw.exe", "filepath": "\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"timestamp\":\"2023-09-18T15:17:55Z\",\"behavior_id\":\"4748\",\"filename\":\"javaw.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\Java\\\\jdk-20\\\\bin\\\\javaw.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\Java\\\\jdk-20\\\\bin\\\\javaw.exe\\\" -Xmx4579m -classpath \\\"zap-2.13.0.jar\\\" org.zaproxy.zap.ZAP\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Malware\",\"tactic_id\":\"CSTA0001\",\"technique\":\"PUP\",\"technique_id\":\"CST0013\",\"display_name\":\"Detect OnWrite Adware/PUP Hash\",\"description\":\"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.\",\"severity\":30,\"confidence\":100,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\bob\\\\OWASP ZAP\\\\fuzzers\\\\fuzzdb\\\\web-backdoors\\\\exe\\\\nc.exe\",\"user_name\":\"bob\",\"user_id\":\"S-1-12-1-1960846385-1299844409-3992341668-2149414984\",\"control_graph_id\":\"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352\",\"triggering_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714\",\"sha256\":\"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15\",\"parent_md5\":\"b6bd7778478740744d9f6b11c367b8be\",\"parent_cmdline\":\"\\\"C:\\\\Program Files\\\\OWASP\\\\Zed Attack Proxy\\\\ZAP.exe\\\" \",\"parent_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=246.7.137.52 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe ::: userName=bob ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-09-18T15:17:55Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "246.7.137.52", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"6e36ac138a7a426fa5d2e4a45da72961","timestamp":"2023-09-18T15:17:55Z","behavior_id":"4748","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4579m -classpath \"zap-2.13.0.jar\" org.zaproxy.zap.ZAP","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","display_name":"Detect OnWrite Adware/PUP Hash","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","severity":30,"confidence":100,"ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\bob\\OWASP ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","user_name":"bob","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","parent_details":{"parent_sha256":"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15","parent_md5":"b6bd7778478740744d9f6b11c367b8be","parent_cmdline":"\"C:\\Program Files\\OWASP\\Zed Attack Proxy\\ZAP.exe\" ","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=246.7.137.52 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: userName=bob ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"6e36ac138a7a426fa5d2e4a45da72961","timestamp":"2023-09-18T15:17:55Z","behavior_id":"4748","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4579m -classpath \"zap-2.13.0.jar\" org.zaproxy.zap.ZAP","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","display_name":"Detect OnWrite Adware/PUP Hash","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","severity":30,"confidence":100,"ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\bob\\OWASP ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","user_name":"bob","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","parent_details":{"parent_sha256":"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15","parent_md5":"b6bd7778478740744d9f6b11c367b8be","parent_cmdline":"\"C:\\Program Files\\OWASP\\Zed Attack Proxy\\ZAP.exe\" ","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=246.7.137.52 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: userName=bob ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: JBETRO-LT4.undefined clientmac: 00ffc0d6f846 filehash: e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 filename: javaw.exe filepath: \Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-09-18T15:17:55Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 246.7.137.52 userName: bob
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=158.127.203.103 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "filename": "powershell.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"fish\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=158.127.203.103 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T16:44:43Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "158.127.203.103", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=158.127.203.103 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=158.127.203.103 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c filename: powershell.exe filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T16:44:43Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 158.127.203.103 userName: fish
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=253.115.34.247 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "filename": "powershell.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"charlie\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=253.115.34.247 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T16:44:43Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "253.115.34.247", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=253.115.34.247 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=253.115.34.247 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c filename: powershell.exe filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T16:44:43Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 253.115.34.247 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=9.175.12.98 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "filename": "powershell.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=9.175.12.98 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T16:44:43Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "9.175.12.98", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=9.175.12.98 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=9.175.12.98 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c filename: powershell.exe filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T16:44:43Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 9.175.12.98 userName: alice
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\nighthawk\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\nighthawk\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=106.83.137.60 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\nighthawk\Downloads\PSTools\PsExec.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b", "filename": "PsExec.exe", "filepath": "\\Device\\HarddiskVolume1\\Users\\INFRDEV-pentest\\Downloads\\PSTools\\PsExec.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T18:24:34Z\",\"template_instance_id\":\"1384\",\"behavior_id\":\"10447\",\"filename\":\"PsExec.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Users\\\\nighthawk\\\\Downloads\\\\PSTools\\\\PsExec.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\nighthawk\\\\Downloads\\\\PSTools\\\\PsExec.exe\\\" -i -s cmd.exe\",\"scenario\":\"suspicious_activity\",\"objective\":\"Gain Access\",\"tactic\":\"Privilege Escalation\",\"tactic_id\":\"TA0004\",\"technique\":\"Abuse Elevation Control Mechanism\",\"technique_id\":\"T1548\",\"display_name\":\"SuspiciousPrivEsc\",\"description\":\"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.\",\"severity\":30,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"nighthawk\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738\",\"sha256\":\"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b\",\"md5\":\"24a648a48741b1ac809e47b9543c6f12\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426\"},\"pattern_disposition\":0,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=106.83.137.60 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\\Device\\HarddiskVolume1\\Users\\nighthawk\\Downloads\\PSTools\\PsExec.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T18:24:34Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "106.83.137.60", "userName": "nighthawk" }
Create a JSON artifact from the message