input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"251.28.8.163","externalIp":"95.250.230.12","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=251.28.8.163 ::: serverIP=95.250.230.12 ::: userName=fish ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-13T05:26:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"251.28.8.163\",\"externalIp\":\"95.250.230.12\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T05:26:58.000Z\"} ::: clientIP=251.28.8.163 ::: serverIP=95.250.230.12 ::: userName=fish ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "bit.ly",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "bit.ly",
"vendorcode": "URL ShortenersApplicationCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "251.28.8.163",
"serverIP": "95.250.230.12",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"251.28.8.163","externalIp":"95.250.230.12","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=251.28.8.163 ::: serverIP=95.250.230.12 ::: userName=fish ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"251.28.8.163","externalIp":"95.250.230.12","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=251.28.8.163 ::: serverIP=95.250.230.12 ::: userName=fish ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-13T05:26:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: bit.ly
messagetype: firewall_action
severitycode: 2
fqdn: bit.ly
vendorcode: URL ShortenersApplicationCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 251.28.8.163
serverIP: 95.250.230.12
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"54.83.120.105","externalIp":"214.246.102.127","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=54.83.120.105 ::: serverIP=214.246.102.127 ::: userName=alice ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-13T05:26:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"54.83.120.105\",\"externalIp\":\"214.246.102.127\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T05:26:58.000Z\"} ::: clientIP=54.83.120.105 ::: serverIP=214.246.102.127 ::: userName=alice ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "bit.ly",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "bit.ly",
"vendorcode": "URL ShortenersApplicationCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "54.83.120.105",
"serverIP": "214.246.102.127",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"54.83.120.105","externalIp":"214.246.102.127","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=54.83.120.105 ::: serverIP=214.246.102.127 ::: userName=alice ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"54.83.120.105","externalIp":"214.246.102.127","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-13T05:26:58.000Z"} ::: clientIP=54.83.120.105 ::: serverIP=214.246.102.127 ::: userName=alice ::: created_at=2022-05-13T05:26:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T05:26:58.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-13T05:26:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: bit.ly
messagetype: firewall_action
severitycode: 2
fqdn: bit.ly
vendorcode: URL ShortenersApplicationCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 54.83.120.105
serverIP: 214.246.102.127
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"242.224.127.147","externalIp":"222.72.244.95","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=242.224.127.147 ::: serverIP=222.72.244.95 ::: userName=fish ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-13T06:04:43.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"242.224.127.147\",\"externalIp\":\"222.72.244.95\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:04:43.000Z\"} ::: clientIP=242.224.127.147 ::: serverIP=222.72.244.95 ::: userName=fish ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "bit.ly",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "bit.ly",
"vendorcode": "URL ShortenersApplicationCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "242.224.127.147",
"serverIP": "222.72.244.95",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"242.224.127.147","externalIp":"222.72.244.95","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=242.224.127.147 ::: serverIP=222.72.244.95 ::: userName=fish ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"242.224.127.147","externalIp":"222.72.244.95","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=242.224.127.147 ::: serverIP=222.72.244.95 ::: userName=fish ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-13T06:04:43.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: bit.ly
messagetype: firewall_action
severitycode: 2
fqdn: bit.ly
vendorcode: URL ShortenersApplicationCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 242.224.127.147
serverIP: 222.72.244.95
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"17.2.181.134","externalIp":"163.115.128.9","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=17.2.181.134 ::: serverIP=163.115.128.9 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-13T06:04:43.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"17.2.181.134\",\"externalIp\":\"163.115.128.9\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:04:43.000Z\"} ::: clientIP=17.2.181.134 ::: serverIP=163.115.128.9 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "bit.ly",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "bit.ly",
"vendorcode": "URL ShortenersApplicationCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "17.2.181.134",
"serverIP": "163.115.128.9",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"17.2.181.134","externalIp":"163.115.128.9","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=17.2.181.134 ::: serverIP=163.115.128.9 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"17.2.181.134","externalIp":"163.115.128.9","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=17.2.181.134 ::: serverIP=163.115.128.9 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-13T06:04:43.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: bit.ly
messagetype: firewall_action
severitycode: 2
fqdn: bit.ly
vendorcode: URL ShortenersApplicationCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 17.2.181.134
serverIP: 163.115.128.9
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"77.56.235.47","externalIp":"230.134.179.242","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=77.56.235.47 ::: serverIP=230.134.179.242 ::: userName=bob ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-29T19:11:24.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"77.56.235.47\",\"externalIp\":\"230.134.179.242\",\"categories\":[\"Malware\",\"File Transfer Services\"],\"tags\":[],\"destination\":\"my.mixtape.moe\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-29T19:11:24.000Z\"} ::: clientIP=77.56.235.47 ::: serverIP=230.134.179.242 ::: userName=bob ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "my.mixtape.moe",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "my.mixtape.moe",
"vendorcode": "MalwareFile Transfer Services",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "77.56.235.47",
"serverIP": "230.134.179.242",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"77.56.235.47","externalIp":"230.134.179.242","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=77.56.235.47 ::: serverIP=230.134.179.242 ::: userName=bob ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"77.56.235.47","externalIp":"230.134.179.242","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=77.56.235.47 ::: serverIP=230.134.179.242 ::: userName=bob ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-29T19:11:24.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: my.mixtape.moe
messagetype: firewall_action
severitycode: 2
fqdn: my.mixtape.moe
vendorcode: MalwareFile Transfer Services
action: block
streamName: OpenDNS Detection
clientIP: 77.56.235.47
serverIP: 230.134.179.242
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"197.96.251.231","externalIp":"46.195.213.120","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=197.96.251.231 ::: serverIP=46.195.213.120 ::: userName=johndoe ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-29T19:11:24.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"197.96.251.231\",\"externalIp\":\"46.195.213.120\",\"categories\":[\"Malware\",\"File Transfer Services\"],\"tags\":[],\"destination\":\"my.mixtape.moe\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-29T19:11:24.000Z\"} ::: clientIP=197.96.251.231 ::: serverIP=46.195.213.120 ::: userName=johndoe ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "my.mixtape.moe",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "my.mixtape.moe",
"vendorcode": "MalwareFile Transfer Services",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "197.96.251.231",
"serverIP": "46.195.213.120",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"197.96.251.231","externalIp":"46.195.213.120","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=197.96.251.231 ::: serverIP=46.195.213.120 ::: userName=johndoe ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=my.mixtape.moe ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"197.96.251.231","externalIp":"46.195.213.120","categories":["Malware","File Transfer Services"],"tags":[],"destination":"my.mixtape.moe","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-29T19:11:24.000Z"} ::: clientIP=197.96.251.231 ::: serverIP=46.195.213.120 ::: userName=johndoe ::: created_at=2022-06-29T19:11:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareFile Transfer Services ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-29T19:11:24.000Z ::: serverHostname=my.mixtape.moe ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-29T19:11:24.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: my.mixtape.moe
messagetype: firewall_action
severitycode: 2
fqdn: my.mixtape.moe
vendorcode: MalwareFile Transfer Services
action: block
streamName: OpenDNS Detection
clientIP: 197.96.251.231
serverIP: 46.195.213.120
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"173.71.184.139","externalIp":"253.20.97.218","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=173.71.184.139 ::: serverIP=253.20.97.218 ::: userName=fish ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-13T06:04:43.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"173.71.184.139\",\"externalIp\":\"253.20.97.218\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:04:43.000Z\"} ::: clientIP=173.71.184.139 ::: serverIP=253.20.97.218 ::: userName=fish ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "bit.ly",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "bit.ly",
"vendorcode": "URL ShortenersApplicationCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "173.71.184.139",
"serverIP": "253.20.97.218",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"173.71.184.139","externalIp":"253.20.97.218","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=173.71.184.139 ::: serverIP=253.20.97.218 ::: userName=fish ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"173.71.184.139","externalIp":"253.20.97.218","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=173.71.184.139 ::: serverIP=253.20.97.218 ::: userName=fish ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-13T06:04:43.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: bit.ly
messagetype: firewall_action
severitycode: 2
fqdn: bit.ly
vendorcode: URL ShortenersApplicationCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 173.71.184.139
serverIP: 253.20.97.218
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"107.28.70.130","externalIp":"230.151.96.245","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=107.28.70.130 ::: serverIP=230.151.96.245 ::: userName=alice ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-13T06:04:43.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"107.28.70.130\",\"externalIp\":\"230.151.96.245\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:04:43.000Z\"} ::: clientIP=107.28.70.130 ::: serverIP=230.151.96.245 ::: userName=alice ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "bit.ly",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "bit.ly",
"vendorcode": "URL ShortenersApplicationCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "107.28.70.130",
"serverIP": "230.151.96.245",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"107.28.70.130","externalIp":"230.151.96.245","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=107.28.70.130 ::: serverIP=230.151.96.245 ::: userName=alice ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"107.28.70.130","externalIp":"230.151.96.245","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=107.28.70.130 ::: serverIP=230.151.96.245 ::: userName=alice ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-13T06:04:43.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: bit.ly
messagetype: firewall_action
severitycode: 2
fqdn: bit.ly
vendorcode: URL ShortenersApplicationCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 107.28.70.130
serverIP: 230.151.96.245
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"23.153.102.81","externalIp":"25.25.161.37","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=23.153.102.81 ::: serverIP=25.25.161.37 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-13T06:04:43.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"23.153.102.81\",\"externalIp\":\"25.25.161.37\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:04:43.000Z\"} ::: clientIP=23.153.102.81 ::: serverIP=25.25.161.37 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "bit.ly",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "bit.ly",
"vendorcode": "URL ShortenersApplicationCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "23.153.102.81",
"serverIP": "25.25.161.37",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"23.153.102.81","externalIp":"25.25.161.37","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=23.153.102.81 ::: serverIP=25.25.161.37 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"23.153.102.81","externalIp":"25.25.161.37","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=23.153.102.81 ::: serverIP=25.25.161.37 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-13T06:04:43.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: bit.ly
messagetype: firewall_action
severitycode: 2
fqdn: bit.ly
vendorcode: URL ShortenersApplicationCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 23.153.102.81
serverIP: 25.25.161.37
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"145.222.181.209","externalIp":"2.157.190.27","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=145.222.181.209 ::: serverIP=2.157.190.27 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-13T06:04:43.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"145.222.181.209\",\"externalIp\":\"2.157.190.27\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T06:04:43.000Z\"} ::: clientIP=145.222.181.209 ::: serverIP=2.157.190.27 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "bit.ly",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "bit.ly",
"vendorcode": "URL ShortenersApplicationCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "145.222.181.209",
"serverIP": "2.157.190.27",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"145.222.181.209","externalIp":"2.157.190.27","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=145.222.181.209 ::: serverIP=2.157.190.27 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"145.222.181.209","externalIp":"2.157.190.27","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-13T06:04:43.000Z"} ::: clientIP=145.222.181.209 ::: serverIP=2.157.190.27 ::: userName=johndoe ::: created_at=2022-05-13T06:04:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T06:04:43.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-13T06:04:43.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: bit.ly
messagetype: firewall_action
severitycode: 2
fqdn: bit.ly
vendorcode: URL ShortenersApplicationCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 145.222.181.209
serverIP: 2.157.190.27
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"223.214.248.233","externalIp":"189.128.184.225","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=223.214.248.233 ::: serverIP=189.128.184.225 ::: userName=johndoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-23T15:36:48.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"223.214.248.233\",\"externalIp\":\"189.128.184.225\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=223.214.248.233 ::: serverIP=189.128.184.225 ::: userName=johndoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "223.214.248.233",
"serverIP": "189.128.184.225",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"223.214.248.233","externalIp":"189.128.184.225","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=223.214.248.233 ::: serverIP=189.128.184.225 ::: userName=johndoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"223.214.248.233","externalIp":"189.128.184.225","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=223.214.248.233 ::: serverIP=189.128.184.225 ::: userName=johndoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-23T15:36:48.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 223.214.248.233
serverIP: 189.128.184.225
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"149.35.135.83","externalIp":"197.213.156.108","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=149.35.135.83 ::: serverIP=197.213.156.108 ::: userName=alice ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-23T15:36:48.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"149.35.135.83\",\"externalIp\":\"197.213.156.108\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=149.35.135.83 ::: serverIP=197.213.156.108 ::: userName=alice ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "149.35.135.83",
"serverIP": "197.213.156.108",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"149.35.135.83","externalIp":"197.213.156.108","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=149.35.135.83 ::: serverIP=197.213.156.108 ::: userName=alice ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"149.35.135.83","externalIp":"197.213.156.108","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=149.35.135.83 ::: serverIP=197.213.156.108 ::: userName=alice ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-23T15:36:48.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 149.35.135.83
serverIP: 197.213.156.108
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"191.84.59.224","externalIp":"113.74.205.36","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=191.84.59.224 ::: serverIP=113.74.205.36 ::: userName=alice ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-23T15:36:48.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"191.84.59.224\",\"externalIp\":\"113.74.205.36\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=191.84.59.224 ::: serverIP=113.74.205.36 ::: userName=alice ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "191.84.59.224",
"serverIP": "113.74.205.36",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"191.84.59.224","externalIp":"113.74.205.36","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=191.84.59.224 ::: serverIP=113.74.205.36 ::: userName=alice ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"191.84.59.224","externalIp":"113.74.205.36","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=191.84.59.224 ::: serverIP=113.74.205.36 ::: userName=alice ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-23T15:36:48.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 191.84.59.224
serverIP: 113.74.205.36
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"14.133.113.202","externalIp":"47.34.159.131","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=14.133.113.202 ::: serverIP=47.34.159.131 ::: userName=fish ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-23T15:36:48.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"14.133.113.202\",\"externalIp\":\"47.34.159.131\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=14.133.113.202 ::: serverIP=47.34.159.131 ::: userName=fish ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "14.133.113.202",
"serverIP": "47.34.159.131",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"14.133.113.202","externalIp":"47.34.159.131","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=14.133.113.202 ::: serverIP=47.34.159.131 ::: userName=fish ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"14.133.113.202","externalIp":"47.34.159.131","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=14.133.113.202 ::: serverIP=47.34.159.131 ::: userName=fish ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-23T15:36:48.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 14.133.113.202
serverIP: 47.34.159.131
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"63.159.20.225","externalIp":"84.100.229.127","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=63.159.20.225 ::: serverIP=84.100.229.127 ::: userName=janedoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-23T15:36:48.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"63.159.20.225\",\"externalIp\":\"84.100.229.127\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=63.159.20.225 ::: serverIP=84.100.229.127 ::: userName=janedoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "63.159.20.225",
"serverIP": "84.100.229.127",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"63.159.20.225","externalIp":"84.100.229.127","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=63.159.20.225 ::: serverIP=84.100.229.127 ::: userName=janedoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"63.159.20.225","externalIp":"84.100.229.127","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=63.159.20.225 ::: serverIP=84.100.229.127 ::: userName=janedoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-23T15:36:48.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 63.159.20.225
serverIP: 84.100.229.127
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"49.214.51.11","externalIp":"237.3.64.165","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=49.214.51.11 ::: serverIP=237.3.64.165 ::: userName=janedoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-23T15:36:48.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"49.214.51.11\",\"externalIp\":\"237.3.64.165\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=49.214.51.11 ::: serverIP=237.3.64.165 ::: userName=janedoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "49.214.51.11",
"serverIP": "237.3.64.165",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"49.214.51.11","externalIp":"237.3.64.165","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=49.214.51.11 ::: serverIP=237.3.64.165 ::: userName=janedoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"49.214.51.11","externalIp":"237.3.64.165","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=49.214.51.11 ::: serverIP=237.3.64.165 ::: userName=janedoe ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-23T15:36:48.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 49.214.51.11
serverIP: 237.3.64.165
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"167.112.185.114","externalIp":"52.29.228.20","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=167.112.185.114 ::: serverIP=52.29.228.20 ::: userName=bob ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-23T15:36:48.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"167.112.185.114\",\"externalIp\":\"52.29.228.20\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=167.112.185.114 ::: serverIP=52.29.228.20 ::: userName=bob ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "167.112.185.114",
"serverIP": "52.29.228.20",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"167.112.185.114","externalIp":"52.29.228.20","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=167.112.185.114 ::: serverIP=52.29.228.20 ::: userName=bob ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"167.112.185.114","externalIp":"52.29.228.20","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=167.112.185.114 ::: serverIP=52.29.228.20 ::: userName=bob ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-23T15:36:48.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 167.112.185.114
serverIP: 52.29.228.20
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"93.96.3.108","externalIp":"43.89.105.38","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=93.96.3.108 ::: serverIP=43.89.105.38 ::: userName=nighthawk ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-23T15:36:48.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"93.96.3.108\",\"externalIp\":\"43.89.105.38\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=93.96.3.108 ::: serverIP=43.89.105.38 ::: userName=nighthawk ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "93.96.3.108",
"serverIP": "43.89.105.38",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"93.96.3.108","externalIp":"43.89.105.38","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=93.96.3.108 ::: serverIP=43.89.105.38 ::: userName=nighthawk ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"93.96.3.108","externalIp":"43.89.105.38","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=93.96.3.108 ::: serverIP=43.89.105.38 ::: userName=nighthawk ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-23T15:36:48.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 93.96.3.108
serverIP: 43.89.105.38
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"52.35.152.243","externalIp":"97.221.56.158","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=52.35.152.243 ::: serverIP=97.221.56.158 ::: userName=fish ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-23T15:36:48.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"52.35.152.243\",\"externalIp\":\"97.221.56.158\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=52.35.152.243 ::: serverIP=97.221.56.158 ::: userName=fish ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "52.35.152.243",
"serverIP": "97.221.56.158",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"52.35.152.243","externalIp":"97.221.56.158","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=52.35.152.243 ::: serverIP=97.221.56.158 ::: userName=fish ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"52.35.152.243","externalIp":"97.221.56.158","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=52.35.152.243 ::: serverIP=97.221.56.158 ::: userName=fish ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-23T15:36:48.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 52.35.152.243
serverIP: 97.221.56.158
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"86.97.44.169","externalIp":"141.120.195.207","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=86.97.44.169 ::: serverIP=141.120.195.207 ::: userName=bob ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-23T15:36:48.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"86.97.44.169\",\"externalIp\":\"141.120.195.207\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T15:36:48.000Z\"} ::: clientIP=86.97.44.169 ::: serverIP=141.120.195.207 ::: userName=bob ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "86.97.44.169",
"serverIP": "141.120.195.207",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"86.97.44.169","externalIp":"141.120.195.207","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=86.97.44.169 ::: serverIP=141.120.195.207 ::: userName=bob ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"86.97.44.169","externalIp":"141.120.195.207","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-23T15:36:48.000Z"} ::: clientIP=86.97.44.169 ::: serverIP=141.120.195.207 ::: userName=bob ::: created_at=2022-06-23T15:36:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T15:36:48.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-23T15:36:48.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 86.97.44.169
serverIP: 141.120.195.207
userName: bob | Explain this syslog message |
<172>Feb 01 2023 17:29:28 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:216.187.57.163/55275 dst outside:92.154.108.71/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 01 2023 17:29:28 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:216.187.57.163/55275 dst outside:92.154.108.71/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 55275,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "216.187.57.163",
"serverIP": "92.154.108.71"
} | Create a JSON artifact from the message |
<172>Feb 01 2023 17:29:28 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:216.187.57.163/55275 dst outside:92.154.108.71/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 01 2023 17:29:28 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:216.187.57.163/55275 dst outside:92.154.108.71/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 55275
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 216.187.57.163
serverIP: 92.154.108.71 | Explain this syslog message |
<172>Feb 01 2023 17:29:28 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:46.199.164.157/55275 dst outside:188.8.91.199/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 01 2023 17:29:28 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:46.199.164.157/55275 dst outside:188.8.91.199/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 55275,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "46.199.164.157",
"serverIP": "188.8.91.199"
} | Create a JSON artifact from the message |
<172>Feb 01 2023 17:29:28 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:46.199.164.157/55275 dst outside:188.8.91.199/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 01 2023 17:29:28 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:46.199.164.157/55275 dst outside:188.8.91.199/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 55275
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 46.199.164.157
serverIP: 188.8.91.199 | Explain this syslog message |
<185>Sep 2 20:07:36 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=253.140.110.21 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=31.184.30.132 spt=59304 requestMethod=GET app=HTTP requestContext="-" start=Sep 02 2023 20:07:36 rt=1693703256614 request=/ requestClientApplication="Mozilla/5.0 (X11; U; Linux x86_64; en-us) AppleWebKit/534.35 (KHTML, like Gecko) Chrome/11.0.696.65 Safari/534.35 Puffin/2.9174AT" dvchost=WAFirewall externalId=18a5894b9ee-b3c3a3e9 cn2=59304 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=31.184.30.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 59304,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1693703256614 ",
"message": "<185>Sep 2 20:07:36 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=253.140.110.21 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=31.184.30.132 spt=59304 requestMethod=GET app=HTTP requestContext=\"-\" start=Sep 02 2023 20:07:36 rt=1693703256614 request=/ requestClientApplication=\"Mozilla/5.0 (X11; U; Linux x86_64; en-us) AppleWebKit/534.35 (KHTML, like Gecko) Chrome/11.0.696.65 Safari/534.35 Puffin/2.9174AT\" dvchost=WAFirewall externalId=18a5894b9ee-b3c3a3e9 cn2=59304 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=31.184.30.132 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:79.124.49.10",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "31.184.30.132",
"serverIP": "253.140.110.21",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 2 20:07:36 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=253.140.110.21 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=31.184.30.132 spt=59304 requestMethod=GET app=HTTP requestContext="-" start=Sep 02 2023 20:07:36 rt=1693703256614 request=/ requestClientApplication="Mozilla/5.0 (X11; U; Linux x86_64; en-us) AppleWebKit/534.35 (KHTML, like Gecko) Chrome/11.0.696.65 Safari/534.35 Puffin/2.9174AT" dvchost=WAFirewall externalId=18a5894b9ee-b3c3a3e9 cn2=59304 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=31.184.30.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 2 20:07:36 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=253.140.110.21 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=31.184.30.132 spt=59304 requestMethod=GET app=HTTP requestContext="-" start=Sep 02 2023 20:07:36 rt=1693703256614 request=/ requestClientApplication="Mozilla/5.0 (X11; U; Linux x86_64; en-us) AppleWebKit/534.35 (KHTML, like Gecko) Chrome/11.0.696.65 Safari/534.35 Puffin/2.9174AT" dvchost=WAFirewall externalId=18a5894b9ee-b3c3a3e9 cn2=59304 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=31.184.30.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 59304
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1693703256614
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:79.124.49.10', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 31.184.30.132
serverIP: 253.140.110.21
userName: - | Explain this syslog message |
<185>Sep 2 20:07:36 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=48.11.200.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=244.251.249.246 spt=59304 requestMethod=GET app=HTTP requestContext="-" start=Sep 02 2023 20:07:36 rt=1693703256614 request=/ requestClientApplication="Mozilla/5.0 (X11; U; Linux x86_64; en-us) AppleWebKit/534.35 (KHTML, like Gecko) Chrome/11.0.696.65 Safari/534.35 Puffin/2.9174AT" dvchost=WAFirewall externalId=18a5894b9ee-b3c3a3e9 cn2=59304 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=244.251.249.246 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 59304,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1693703256614 ",
"message": "<185>Sep 2 20:07:36 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=48.11.200.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=244.251.249.246 spt=59304 requestMethod=GET app=HTTP requestContext=\"-\" start=Sep 02 2023 20:07:36 rt=1693703256614 request=/ requestClientApplication=\"Mozilla/5.0 (X11; U; Linux x86_64; en-us) AppleWebKit/534.35 (KHTML, like Gecko) Chrome/11.0.696.65 Safari/534.35 Puffin/2.9174AT\" dvchost=WAFirewall externalId=18a5894b9ee-b3c3a3e9 cn2=59304 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=244.251.249.246 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:79.124.49.10",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "244.251.249.246",
"serverIP": "48.11.200.212",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 2 20:07:36 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=48.11.200.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=244.251.249.246 spt=59304 requestMethod=GET app=HTTP requestContext="-" start=Sep 02 2023 20:07:36 rt=1693703256614 request=/ requestClientApplication="Mozilla/5.0 (X11; U; Linux x86_64; en-us) AppleWebKit/534.35 (KHTML, like Gecko) Chrome/11.0.696.65 Safari/534.35 Puffin/2.9174AT" dvchost=WAFirewall externalId=18a5894b9ee-b3c3a3e9 cn2=59304 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=244.251.249.246 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 2 20:07:36 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=48.11.200.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=244.251.249.246 spt=59304 requestMethod=GET app=HTTP requestContext="-" start=Sep 02 2023 20:07:36 rt=1693703256614 request=/ requestClientApplication="Mozilla/5.0 (X11; U; Linux x86_64; en-us) AppleWebKit/534.35 (KHTML, like Gecko) Chrome/11.0.696.65 Safari/534.35 Puffin/2.9174AT" dvchost=WAFirewall externalId=18a5894b9ee-b3c3a3e9 cn2=59304 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=244.251.249.246 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 59304
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1693703256614
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:79.124.49.10', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 244.251.249.246
serverIP: 48.11.200.212
userName: - | Explain this syslog message |
<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=209.91.94.100 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=83.253.161.19 spt=54028 requestMethod=GET app=HTTP requestContext="-" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.253.161.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54028,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1702104138428 ",
"message": "<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=209.91.94.100 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=83.253.161.19 spt=54028 requestMethod=GET app=HTTP requestContext=\"-\" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication=\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.253.161.19 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:128.199.46.241",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "83.253.161.19",
"serverIP": "209.91.94.100",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=209.91.94.100 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=83.253.161.19 spt=54028 requestMethod=GET app=HTTP requestContext="-" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.253.161.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=209.91.94.100 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=83.253.161.19 spt=54028 requestMethod=GET app=HTTP requestContext="-" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.253.161.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54028
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1702104138428
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:128.199.46.241', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 83.253.161.19
serverIP: 209.91.94.100
userName: - | Explain this syslog message |
<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=234.90.118.148 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=154.51.70.204 spt=54028 requestMethod=GET app=HTTP requestContext="-" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.51.70.204 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54028,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1702104138428 ",
"message": "<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=234.90.118.148 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=154.51.70.204 spt=54028 requestMethod=GET app=HTTP requestContext=\"-\" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication=\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.51.70.204 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:128.199.46.241",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "154.51.70.204",
"serverIP": "234.90.118.148",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=234.90.118.148 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=154.51.70.204 spt=54028 requestMethod=GET app=HTTP requestContext="-" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.51.70.204 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=234.90.118.148 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=154.51.70.204 spt=54028 requestMethod=GET app=HTTP requestContext="-" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.51.70.204 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54028
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1702104138428
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:128.199.46.241', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 154.51.70.204
serverIP: 234.90.118.148
userName: - | Explain this syslog message |
<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=44.95.183.23 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=186.123.10.10 spt=54028 requestMethod=GET app=HTTP requestContext="-" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.123.10.10 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54028,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1702104138428 ",
"message": "<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=44.95.183.23 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=186.123.10.10 spt=54028 requestMethod=GET app=HTTP requestContext=\"-\" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication=\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.123.10.10 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:128.199.46.241",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "186.123.10.10",
"serverIP": "44.95.183.23",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=44.95.183.23 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=186.123.10.10 spt=54028 requestMethod=GET app=HTTP requestContext="-" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.123.10.10 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 9 00:42:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=44.95.183.23 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=186.123.10.10 spt=54028 requestMethod=GET app=HTTP requestContext="-" start=Dec 09 2023 00:42:18 rt=1702104138428 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c4d50028b-dea09fef cn2=54028 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.123.10.10 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54028
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1702104138428
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:128.199.46.241', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 186.123.10.10
serverIP: 44.95.183.23
userName: - | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"6e36ac138a7a426fa5d2e4a45da72961","timestamp":"2023-09-18T15:17:55Z","behavior_id":"4748","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4579m -classpath \"zap-2.13.0.jar\" org.zaproxy.zap.ZAP","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","display_name":"Detect OnWrite Adware/PUP Hash","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","severity":30,"confidence":100,"ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\alice\\OWASP ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","user_name":"alice","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","parent_details":{"parent_sha256":"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15","parent_md5":"b6bd7778478740744d9f6b11c367b8be","parent_cmdline":"\"C:\\Program Files\\OWASP\\Zed Attack Proxy\\ZAP.exe\" ","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=202.52.58.57 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: userName=alice ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "JBETRO-LT4.undefined",
"clientmac": "00ffc0d6f846",
"filehash": "e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851",
"filename": "javaw.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"timestamp\":\"2023-09-18T15:17:55Z\",\"behavior_id\":\"4748\",\"filename\":\"javaw.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\Java\\\\jdk-20\\\\bin\\\\javaw.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\Java\\\\jdk-20\\\\bin\\\\javaw.exe\\\" -Xmx4579m -classpath \\\"zap-2.13.0.jar\\\" org.zaproxy.zap.ZAP\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Malware\",\"tactic_id\":\"CSTA0001\",\"technique\":\"PUP\",\"technique_id\":\"CST0013\",\"display_name\":\"Detect OnWrite Adware/PUP Hash\",\"description\":\"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.\",\"severity\":30,\"confidence\":100,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\alice\\\\OWASP ZAP\\\\fuzzers\\\\fuzzdb\\\\web-backdoors\\\\exe\\\\nc.exe\",\"user_name\":\"alice\",\"user_id\":\"S-1-12-1-1960846385-1299844409-3992341668-2149414984\",\"control_graph_id\":\"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352\",\"triggering_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714\",\"sha256\":\"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15\",\"parent_md5\":\"b6bd7778478740744d9f6b11c367b8be\",\"parent_cmdline\":\"\\\"C:\\\\Program Files\\\\OWASP\\\\Zed Attack Proxy\\\\ZAP.exe\\\" \",\"parent_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=202.52.58.57 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe ::: userName=alice ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-09-18T15:17:55Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "202.52.58.57",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"6e36ac138a7a426fa5d2e4a45da72961","timestamp":"2023-09-18T15:17:55Z","behavior_id":"4748","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4579m -classpath \"zap-2.13.0.jar\" org.zaproxy.zap.ZAP","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","display_name":"Detect OnWrite Adware/PUP Hash","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","severity":30,"confidence":100,"ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\alice\\OWASP ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","user_name":"alice","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","parent_details":{"parent_sha256":"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15","parent_md5":"b6bd7778478740744d9f6b11c367b8be","parent_cmdline":"\"C:\\Program Files\\OWASP\\Zed Attack Proxy\\ZAP.exe\" ","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=202.52.58.57 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: userName=alice ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"6e36ac138a7a426fa5d2e4a45da72961","timestamp":"2023-09-18T15:17:55Z","behavior_id":"4748","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4579m -classpath \"zap-2.13.0.jar\" org.zaproxy.zap.ZAP","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","display_name":"Detect OnWrite Adware/PUP Hash","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","severity":30,"confidence":100,"ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\alice\\OWASP ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","user_name":"alice","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","parent_details":{"parent_sha256":"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15","parent_md5":"b6bd7778478740744d9f6b11c367b8be","parent_cmdline":"\"C:\\Program Files\\OWASP\\Zed Attack Proxy\\ZAP.exe\" ","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=202.52.58.57 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: userName=alice ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: JBETRO-LT4.undefined
clientmac: 00ffc0d6f846
filehash: e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851
filename: javaw.exe
filepath: \Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-09-18T15:17:55Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 202.52.58.57
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"6e36ac138a7a426fa5d2e4a45da72961","timestamp":"2023-09-18T15:17:55Z","behavior_id":"4748","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4579m -classpath \"zap-2.13.0.jar\" org.zaproxy.zap.ZAP","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","display_name":"Detect OnWrite Adware/PUP Hash","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","severity":30,"confidence":100,"ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\johndoe\\OWASP ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","user_name":"johndoe","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","parent_details":{"parent_sha256":"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15","parent_md5":"b6bd7778478740744d9f6b11c367b8be","parent_cmdline":"\"C:\\Program Files\\OWASP\\Zed Attack Proxy\\ZAP.exe\" ","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=245.58.115.189 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: userName=johndoe ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "JBETRO-LT4.undefined",
"clientmac": "00ffc0d6f846",
"filehash": "e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851",
"filename": "javaw.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"timestamp\":\"2023-09-18T15:17:55Z\",\"behavior_id\":\"4748\",\"filename\":\"javaw.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\Java\\\\jdk-20\\\\bin\\\\javaw.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\Java\\\\jdk-20\\\\bin\\\\javaw.exe\\\" -Xmx4579m -classpath \\\"zap-2.13.0.jar\\\" org.zaproxy.zap.ZAP\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Malware\",\"tactic_id\":\"CSTA0001\",\"technique\":\"PUP\",\"technique_id\":\"CST0013\",\"display_name\":\"Detect OnWrite Adware/PUP Hash\",\"description\":\"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.\",\"severity\":30,\"confidence\":100,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\johndoe\\\\OWASP ZAP\\\\fuzzers\\\\fuzzdb\\\\web-backdoors\\\\exe\\\\nc.exe\",\"user_name\":\"johndoe\",\"user_id\":\"S-1-12-1-1960846385-1299844409-3992341668-2149414984\",\"control_graph_id\":\"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352\",\"triggering_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714\",\"sha256\":\"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15\",\"parent_md5\":\"b6bd7778478740744d9f6b11c367b8be\",\"parent_cmdline\":\"\\\"C:\\\\Program Files\\\\OWASP\\\\Zed Attack Proxy\\\\ZAP.exe\\\" \",\"parent_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=245.58.115.189 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe ::: userName=johndoe ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-09-18T15:17:55Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "245.58.115.189",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"6e36ac138a7a426fa5d2e4a45da72961","timestamp":"2023-09-18T15:17:55Z","behavior_id":"4748","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4579m -classpath \"zap-2.13.0.jar\" org.zaproxy.zap.ZAP","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","display_name":"Detect OnWrite Adware/PUP Hash","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","severity":30,"confidence":100,"ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\johndoe\\OWASP ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","user_name":"johndoe","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","parent_details":{"parent_sha256":"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15","parent_md5":"b6bd7778478740744d9f6b11c367b8be","parent_cmdline":"\"C:\\Program Files\\OWASP\\Zed Attack Proxy\\ZAP.exe\" ","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=245.58.115.189 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: userName=johndoe ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"6e36ac138a7a426fa5d2e4a45da72961","timestamp":"2023-09-18T15:17:55Z","behavior_id":"4748","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4579m -classpath \"zap-2.13.0.jar\" org.zaproxy.zap.ZAP","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","display_name":"Detect OnWrite Adware/PUP Hash","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","severity":30,"confidence":100,"ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\johndoe\\OWASP ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","user_name":"johndoe","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","parent_details":{"parent_sha256":"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15","parent_md5":"b6bd7778478740744d9f6b11c367b8be","parent_cmdline":"\"C:\\Program Files\\OWASP\\Zed Attack Proxy\\ZAP.exe\" ","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=245.58.115.189 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: userName=johndoe ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: JBETRO-LT4.undefined
clientmac: 00ffc0d6f846
filehash: e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851
filename: javaw.exe
filepath: \Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-09-18T15:17:55Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 245.58.115.189
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"6e36ac138a7a426fa5d2e4a45da72961","timestamp":"2023-09-18T15:17:55Z","behavior_id":"4748","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4579m -classpath \"zap-2.13.0.jar\" org.zaproxy.zap.ZAP","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","display_name":"Detect OnWrite Adware/PUP Hash","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","severity":30,"confidence":100,"ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\bob\\OWASP ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","user_name":"bob","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","parent_details":{"parent_sha256":"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15","parent_md5":"b6bd7778478740744d9f6b11c367b8be","parent_cmdline":"\"C:\\Program Files\\OWASP\\Zed Attack Proxy\\ZAP.exe\" ","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=246.7.137.52 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: userName=bob ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "JBETRO-LT4.undefined",
"clientmac": "00ffc0d6f846",
"filehash": "e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851",
"filename": "javaw.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"timestamp\":\"2023-09-18T15:17:55Z\",\"behavior_id\":\"4748\",\"filename\":\"javaw.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\Java\\\\jdk-20\\\\bin\\\\javaw.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\Java\\\\jdk-20\\\\bin\\\\javaw.exe\\\" -Xmx4579m -classpath \\\"zap-2.13.0.jar\\\" org.zaproxy.zap.ZAP\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Malware\",\"tactic_id\":\"CSTA0001\",\"technique\":\"PUP\",\"technique_id\":\"CST0013\",\"display_name\":\"Detect OnWrite Adware/PUP Hash\",\"description\":\"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.\",\"severity\":30,\"confidence\":100,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\bob\\\\OWASP ZAP\\\\fuzzers\\\\fuzzdb\\\\web-backdoors\\\\exe\\\\nc.exe\",\"user_name\":\"bob\",\"user_id\":\"S-1-12-1-1960846385-1299844409-3992341668-2149414984\",\"control_graph_id\":\"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352\",\"triggering_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714\",\"sha256\":\"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15\",\"parent_md5\":\"b6bd7778478740744d9f6b11c367b8be\",\"parent_cmdline\":\"\\\"C:\\\\Program Files\\\\OWASP\\\\Zed Attack Proxy\\\\ZAP.exe\\\" \",\"parent_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=246.7.137.52 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe ::: userName=bob ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-09-18T15:17:55Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "246.7.137.52",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"6e36ac138a7a426fa5d2e4a45da72961","timestamp":"2023-09-18T15:17:55Z","behavior_id":"4748","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4579m -classpath \"zap-2.13.0.jar\" org.zaproxy.zap.ZAP","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","display_name":"Detect OnWrite Adware/PUP Hash","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","severity":30,"confidence":100,"ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\bob\\OWASP ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","user_name":"bob","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","parent_details":{"parent_sha256":"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15","parent_md5":"b6bd7778478740744d9f6b11c367b8be","parent_cmdline":"\"C:\\Program Files\\OWASP\\Zed Attack Proxy\\ZAP.exe\" ","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=246.7.137.52 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: userName=bob ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"6e36ac138a7a426fa5d2e4a45da72961","timestamp":"2023-09-18T15:17:55Z","behavior_id":"4748","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4579m -classpath \"zap-2.13.0.jar\" org.zaproxy.zap.ZAP","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","display_name":"Detect OnWrite Adware/PUP Hash","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","severity":30,"confidence":100,"ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\bob\\OWASP ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","user_name":"bob","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:94492120352","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899862594714","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","parent_details":{"parent_sha256":"41b3771e22a59da9d0bce7feab0f6f59f7c4967c97e8c882d1a301d638d6af15","parent_md5":"b6bd7778478740744d9f6b11c367b8be","parent_cmdline":"\"C:\\Program Files\\OWASP\\Zed Attack Proxy\\ZAP.exe\" ","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:899860396605"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=246.7.137.52 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: fileName=javaw.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: userName=bob ::: clientMAC=00ffc0d6f846 ::: created_at=2023-09-18T15:17:55Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-09-18T15:17:55Z ::: clientHostname=JBETRO-LT4.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: JBETRO-LT4.undefined
clientmac: 00ffc0d6f846
filehash: e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851
filename: javaw.exe
filepath: \Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-09-18T15:17:55Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 246.7.137.52
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=158.127.203.103 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"filename": "powershell.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"fish\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=158.127.203.103 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T16:44:43Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "158.127.203.103",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=158.127.203.103 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=158.127.203.103 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
filename: powershell.exe
filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-29T16:44:43Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 158.127.203.103
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=253.115.34.247 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"filename": "powershell.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"charlie\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=253.115.34.247 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T16:44:43Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "253.115.34.247",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=253.115.34.247 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=253.115.34.247 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
filename: powershell.exe
filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-29T16:44:43Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 253.115.34.247
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=9.175.12.98 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"filename": "powershell.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=9.175.12.98 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T16:44:43Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "9.175.12.98",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=9.175.12.98 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=9.175.12.98 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
filename: powershell.exe
filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-29T16:44:43Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 9.175.12.98
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\nighthawk\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\nighthawk\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=106.83.137.60 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\nighthawk\Downloads\PSTools\PsExec.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b",
"filename": "PsExec.exe",
"filepath": "\\Device\\HarddiskVolume1\\Users\\INFRDEV-pentest\\Downloads\\PSTools\\PsExec.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T18:24:34Z\",\"template_instance_id\":\"1384\",\"behavior_id\":\"10447\",\"filename\":\"PsExec.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Users\\\\nighthawk\\\\Downloads\\\\PSTools\\\\PsExec.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\nighthawk\\\\Downloads\\\\PSTools\\\\PsExec.exe\\\" -i -s cmd.exe\",\"scenario\":\"suspicious_activity\",\"objective\":\"Gain Access\",\"tactic\":\"Privilege Escalation\",\"tactic_id\":\"TA0004\",\"technique\":\"Abuse Elevation Control Mechanism\",\"technique_id\":\"T1548\",\"display_name\":\"SuspiciousPrivEsc\",\"description\":\"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.\",\"severity\":30,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"nighthawk\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738\",\"sha256\":\"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b\",\"md5\":\"24a648a48741b1ac809e47b9543c6f12\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426\"},\"pattern_disposition\":0,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=106.83.137.60 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\\Device\\HarddiskVolume1\\Users\\nighthawk\\Downloads\\PSTools\\PsExec.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T18:24:34Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "106.83.137.60",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.