input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"38.74.31.166","externalIp":"38.74.31.166","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:57:01.000Z"} ::: clientIP=38.74.31.166 ::: serverIP=38.74.31.166 ::: userName=nighthawk ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun",
"message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"38.74.31.166\",\"externalIp\":\"38.74.31.166\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:57:01.000Z\"} ::: clientIP=38.74.31.166 ::: serverIP=38.74.31.166 ::: userName=nighthawk ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-11-02T11:57:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareEntertainment",
"streamName": "OpenDNS Detection",
"clientIP": "38.74.31.166",
"serverIP": "23.75.150.237",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"38.74.31.166","externalIp":"38.74.31.166","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:57:01.000Z"} ::: clientIP=38.74.31.166 ::: serverIP=38.74.31.166 ::: userName=nighthawk ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"38.74.31.166","externalIp":"38.74.31.166","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:57:01.000Z"} ::: clientIP=38.74.31.166 ::: serverIP=38.74.31.166 ::: userName=nighthawk ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-11-02T11:57:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareEntertainment
streamName: OpenDNS Detection
clientIP: 38.74.31.166
serverIP: 23.75.150.237
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"109.144.155.88","externalIp":"109.144.155.88","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=109.144.155.88 ::: serverIP=109.144.155.88 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"109.144.155.88\",\"externalIp\":\"109.144.155.88\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=109.144.155.88 ::: serverIP=109.144.155.88 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-11-02T11:55:45.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareEntertainment",
"streamName": "OpenDNS Detection",
"clientIP": "109.144.155.88",
"serverIP": "147.86.135.10",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"109.144.155.88","externalIp":"109.144.155.88","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=109.144.155.88 ::: serverIP=109.144.155.88 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"109.144.155.88","externalIp":"109.144.155.88","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=109.144.155.88 ::: serverIP=109.144.155.88 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-11-02T11:55:45.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareEntertainment
streamName: OpenDNS Detection
clientIP: 109.144.155.88
serverIP: 147.86.135.10
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"63.175.229.16","externalIp":"63.175.229.16","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=63.175.229.16 ::: serverIP=63.175.229.16 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"63.175.229.16\",\"externalIp\":\"63.175.229.16\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=63.175.229.16 ::: serverIP=63.175.229.16 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-11-02T11:55:45.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareEntertainment",
"streamName": "OpenDNS Detection",
"clientIP": "63.175.229.16",
"serverIP": "190.215.187.166",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"63.175.229.16","externalIp":"63.175.229.16","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=63.175.229.16 ::: serverIP=63.175.229.16 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"63.175.229.16","externalIp":"63.175.229.16","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=63.175.229.16 ::: serverIP=63.175.229.16 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-11-02T11:55:45.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareEntertainment
streamName: OpenDNS Detection
clientIP: 63.175.229.16
serverIP: 190.215.187.166
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"154.149.139.162","externalIp":"154.149.139.162","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:57:01.000Z"} ::: clientIP=154.149.139.162 ::: serverIP=154.149.139.162 ::: userName=janedoe ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun",
"message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"154.149.139.162\",\"externalIp\":\"154.149.139.162\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:57:01.000Z\"} ::: clientIP=154.149.139.162 ::: serverIP=154.149.139.162 ::: userName=janedoe ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-11-02T11:57:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareEntertainment",
"streamName": "OpenDNS Detection",
"clientIP": "154.149.139.162",
"serverIP": "161.204.115.202",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"154.149.139.162","externalIp":"154.149.139.162","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:57:01.000Z"} ::: clientIP=154.149.139.162 ::: serverIP=154.149.139.162 ::: userName=janedoe ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"154.149.139.162","externalIp":"154.149.139.162","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:57:01.000Z"} ::: clientIP=154.149.139.162 ::: serverIP=154.149.139.162 ::: userName=janedoe ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-11-02T11:57:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareEntertainment
streamName: OpenDNS Detection
clientIP: 154.149.139.162
serverIP: 161.204.115.202
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"93.216.133.239","externalIp":"93.216.133.239","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:57:01.000Z"} ::: clientIP=93.216.133.239 ::: serverIP=93.216.133.239 ::: userName=nighthawk ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun",
"message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"93.216.133.239\",\"externalIp\":\"93.216.133.239\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:57:01.000Z\"} ::: clientIP=93.216.133.239 ::: serverIP=93.216.133.239 ::: userName=nighthawk ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-11-02T11:57:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareEntertainment",
"streamName": "OpenDNS Detection",
"clientIP": "93.216.133.239",
"serverIP": "78.238.187.114",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"93.216.133.239","externalIp":"93.216.133.239","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:57:01.000Z"} ::: clientIP=93.216.133.239 ::: serverIP=93.216.133.239 ::: userName=nighthawk ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"93.216.133.239","externalIp":"93.216.133.239","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:57:01.000Z"} ::: clientIP=93.216.133.239 ::: serverIP=93.216.133.239 ::: userName=nighthawk ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-11-02T11:57:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareEntertainment
streamName: OpenDNS Detection
clientIP: 93.216.133.239
serverIP: 78.238.187.114
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"88.219.180.239","externalIp":"88.219.180.239","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=88.219.180.239 ::: serverIP=88.219.180.239 ::: userName=charlie ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"88.219.180.239\",\"externalIp\":\"88.219.180.239\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=88.219.180.239 ::: serverIP=88.219.180.239 ::: userName=charlie ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-11-02T11:55:45.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareEntertainment",
"streamName": "OpenDNS Detection",
"clientIP": "88.219.180.239",
"serverIP": "3.162.58.145",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"88.219.180.239","externalIp":"88.219.180.239","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=88.219.180.239 ::: serverIP=88.219.180.239 ::: userName=charlie ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"88.219.180.239","externalIp":"88.219.180.239","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=88.219.180.239 ::: serverIP=88.219.180.239 ::: userName=charlie ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-11-02T11:55:45.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareEntertainment
streamName: OpenDNS Detection
clientIP: 88.219.180.239
serverIP: 3.162.58.145
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"2.171.172.141","externalIp":"2.171.172.141","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=2.171.172.141 ::: serverIP=2.171.172.141 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"2.171.172.141\",\"externalIp\":\"2.171.172.141\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=2.171.172.141 ::: serverIP=2.171.172.141 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-11-02T11:55:45.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareEntertainment",
"streamName": "OpenDNS Detection",
"clientIP": "2.171.172.141",
"serverIP": "208.44.118.135",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"2.171.172.141","externalIp":"2.171.172.141","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=2.171.172.141 ::: serverIP=2.171.172.141 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"2.171.172.141","externalIp":"2.171.172.141","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=2.171.172.141 ::: serverIP=2.171.172.141 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-11-02T11:55:45.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareEntertainment
streamName: OpenDNS Detection
clientIP: 2.171.172.141
serverIP: 208.44.118.135
userName: bob | Explain this syslog message |
<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=100.101.28.212 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=224.215.112.55 spt=13990 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.215.112.55 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 13990,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegEvent.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1697778283784 ",
"message": "<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=100.101.28.212 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=224.215.112.55 spt=13990 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication=\"Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)\" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.215.112.55 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:185.191.171.8",
"GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "224.215.112.55",
"serverIP": "100.101.28.212",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=100.101.28.212 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=224.215.112.55 spt=13990 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.215.112.55 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=100.101.28.212 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=224.215.112.55 spt=13990 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.215.112.55 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 13990
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegEvent.jsp
localhostname: WAFirewall
localstarttime: 1697778283784
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:185.191.171.8', 'GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 224.215.112.55
serverIP: 100.101.28.212
userName: - | Explain this syslog message |
<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=180.121.224.234 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=113.2.123.242 spt=13990 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=113.2.123.242 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 13990,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegEvent.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1697778283784 ",
"message": "<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=180.121.224.234 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=113.2.123.242 spt=13990 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication=\"Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)\" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=113.2.123.242 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:185.191.171.8",
"GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "113.2.123.242",
"serverIP": "180.121.224.234",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=180.121.224.234 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=113.2.123.242 spt=13990 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=113.2.123.242 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=180.121.224.234 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=113.2.123.242 spt=13990 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=113.2.123.242 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 13990
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegEvent.jsp
localhostname: WAFirewall
localstarttime: 1697778283784
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:185.191.171.8', 'GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 113.2.123.242
serverIP: 180.121.224.234
userName: - | Explain this syslog message |
<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.103.73.124 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.169.24.234 spt=13990 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.169.24.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 13990,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegEvent.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1697778283784 ",
"message": "<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.103.73.124 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=159.169.24.234 spt=13990 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication=\"Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)\" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.169.24.234 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:185.191.171.8",
"GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "159.169.24.234",
"serverIP": "73.103.73.124",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.103.73.124 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.169.24.234 spt=13990 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.169.24.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.103.73.124 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.169.24.234 spt=13990 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.169.24.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 13990
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegEvent.jsp
localhostname: WAFirewall
localstarttime: 1697778283784
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:185.191.171.8', 'GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 159.169.24.234
serverIP: 73.103.73.124
userName: - | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=124.34.155.151 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\charlie\Downloads\PSTools\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b",
"filename": "PsExec.exe",
"filepath": "\\Device\\HarddiskVolume1\\Users\\INFRDEV-pentest\\Downloads\\PSTools\\PsExec.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T18:24:34Z\",\"template_instance_id\":\"1384\",\"behavior_id\":\"10447\",\"filename\":\"PsExec.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Users\\\\charlie\\\\Downloads\\\\PSTools\\\\PsExec.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\charlie\\\\Downloads\\\\PSTools\\\\PsExec.exe\\\" -i -s cmd.exe\",\"scenario\":\"suspicious_activity\",\"objective\":\"Gain Access\",\"tactic\":\"Privilege Escalation\",\"tactic_id\":\"TA0004\",\"technique\":\"Abuse Elevation Control Mechanism\",\"technique_id\":\"T1548\",\"display_name\":\"SuspiciousPrivEsc\",\"description\":\"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.\",\"severity\":30,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"charlie\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738\",\"sha256\":\"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b\",\"md5\":\"24a648a48741b1ac809e47b9543c6f12\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426\"},\"pattern_disposition\":0,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=124.34.155.151 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T18:24:34Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "124.34.155.151",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=124.34.155.151 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\charlie\Downloads\PSTools\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=124.34.155.151 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\charlie\Downloads\PSTools\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
filename: PsExec.exe
filepath: \Device\HarddiskVolume1\Users\INFRDEV-pentest\Downloads\PSTools\PsExec.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-29T18:24:34Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 124.34.155.151
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=123.249.121.248 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\charlie\Downloads\PSTools\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b",
"filename": "PsExec.exe",
"filepath": "\\Device\\HarddiskVolume1\\Users\\INFRDEV-pentest\\Downloads\\PSTools\\PsExec.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T18:24:34Z\",\"template_instance_id\":\"1384\",\"behavior_id\":\"10447\",\"filename\":\"PsExec.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Users\\\\charlie\\\\Downloads\\\\PSTools\\\\PsExec.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\charlie\\\\Downloads\\\\PSTools\\\\PsExec.exe\\\" -i -s cmd.exe\",\"scenario\":\"suspicious_activity\",\"objective\":\"Gain Access\",\"tactic\":\"Privilege Escalation\",\"tactic_id\":\"TA0004\",\"technique\":\"Abuse Elevation Control Mechanism\",\"technique_id\":\"T1548\",\"display_name\":\"SuspiciousPrivEsc\",\"description\":\"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.\",\"severity\":30,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"charlie\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738\",\"sha256\":\"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b\",\"md5\":\"24a648a48741b1ac809e47b9543c6f12\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426\"},\"pattern_disposition\":0,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=123.249.121.248 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T18:24:34Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "123.249.121.248",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=123.249.121.248 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\charlie\Downloads\PSTools\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=123.249.121.248 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\charlie\Downloads\PSTools\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
filename: PsExec.exe
filepath: \Device\HarddiskVolume1\Users\INFRDEV-pentest\Downloads\PSTools\PsExec.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-29T18:24:34Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 123.249.121.248
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=155.37.92.190 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf",
"filename": "reg.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-09T17:21:58Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\reg.exe\\\" query HKLM/f password /t REG_SZ /s\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-21-3008783154-4189408168-2363429128-1618\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=155.37.92.190 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-09T17:21:58Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "155.37.92.190",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=155.37.92.190 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=155.37.92.190 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf
filename: reg.exe
filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-09T17:21:58Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 155.37.92.190
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"janedoe","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=223.63.128.243 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf",
"filename": "reg.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-09T17:21:58Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\reg.exe\\\" query HKLM/f password /t REG_SZ /s\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"janedoe\",\"user_id\":\"S-1-5-21-3008783154-4189408168-2363429128-1618\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=223.63.128.243 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-09T17:21:58Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "223.63.128.243",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"janedoe","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=223.63.128.243 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"janedoe","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=223.63.128.243 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf
filename: reg.exe
filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-09T17:21:58Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 223.63.128.243
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"10.175.93.140","externalIp":"60.3.14.91","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=10.175.93.140 ::: serverIP=60.3.14.91 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-26T16:20:42.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"10.175.93.140\",\"externalIp\":\"60.3.14.91\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=10.175.93.140 ::: serverIP=60.3.14.91 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "10.175.93.140",
"serverIP": "60.3.14.91",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"10.175.93.140","externalIp":"60.3.14.91","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=10.175.93.140 ::: serverIP=60.3.14.91 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"10.175.93.140","externalIp":"60.3.14.91","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=10.175.93.140 ::: serverIP=60.3.14.91 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-26T16:20:42.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 10.175.93.140
serverIP: 60.3.14.91
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"27.206.193.197","externalIp":"139.191.123.160","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=27.206.193.197 ::: serverIP=139.191.123.160 ::: userName=fish ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-26T16:20:42.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"27.206.193.197\",\"externalIp\":\"139.191.123.160\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=27.206.193.197 ::: serverIP=139.191.123.160 ::: userName=fish ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "27.206.193.197",
"serverIP": "139.191.123.160",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"27.206.193.197","externalIp":"139.191.123.160","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=27.206.193.197 ::: serverIP=139.191.123.160 ::: userName=fish ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"27.206.193.197","externalIp":"139.191.123.160","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=27.206.193.197 ::: serverIP=139.191.123.160 ::: userName=fish ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-26T16:20:42.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 27.206.193.197
serverIP: 139.191.123.160
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"74.178.4.29","externalIp":"39.193.68.3","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=74.178.4.29 ::: serverIP=39.193.68.3 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-26T16:20:42.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"74.178.4.29\",\"externalIp\":\"39.193.68.3\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=74.178.4.29 ::: serverIP=39.193.68.3 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "74.178.4.29",
"serverIP": "39.193.68.3",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"74.178.4.29","externalIp":"39.193.68.3","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=74.178.4.29 ::: serverIP=39.193.68.3 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"74.178.4.29","externalIp":"39.193.68.3","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=74.178.4.29 ::: serverIP=39.193.68.3 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-26T16:20:42.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 74.178.4.29
serverIP: 39.193.68.3
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"49.204.64.161","externalIp":"30.68.12.47","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=49.204.64.161 ::: serverIP=30.68.12.47 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-26T16:20:42.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"49.204.64.161\",\"externalIp\":\"30.68.12.47\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=49.204.64.161 ::: serverIP=30.68.12.47 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "49.204.64.161",
"serverIP": "30.68.12.47",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"49.204.64.161","externalIp":"30.68.12.47","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=49.204.64.161 ::: serverIP=30.68.12.47 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"49.204.64.161","externalIp":"30.68.12.47","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=49.204.64.161 ::: serverIP=30.68.12.47 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-26T16:20:42.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 49.204.64.161
serverIP: 30.68.12.47
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"46.26.204.157","externalIp":"117.205.87.4","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=46.26.204.157 ::: serverIP=117.205.87.4 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-26T16:20:42.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"46.26.204.157\",\"externalIp\":\"117.205.87.4\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=46.26.204.157 ::: serverIP=117.205.87.4 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "46.26.204.157",
"serverIP": "117.205.87.4",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"46.26.204.157","externalIp":"117.205.87.4","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=46.26.204.157 ::: serverIP=117.205.87.4 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"46.26.204.157","externalIp":"117.205.87.4","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=46.26.204.157 ::: serverIP=117.205.87.4 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-26T16:20:42.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 46.26.204.157
serverIP: 117.205.87.4
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"221.185.25.241","externalIp":"30.107.165.206","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=221.185.25.241 ::: serverIP=30.107.165.206 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-26T16:20:42.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"221.185.25.241\",\"externalIp\":\"30.107.165.206\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=221.185.25.241 ::: serverIP=30.107.165.206 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "221.185.25.241",
"serverIP": "30.107.165.206",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"221.185.25.241","externalIp":"30.107.165.206","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=221.185.25.241 ::: serverIP=30.107.165.206 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"221.185.25.241","externalIp":"30.107.165.206","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=221.185.25.241 ::: serverIP=30.107.165.206 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-26T16:20:42.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 221.185.25.241
serverIP: 30.107.165.206
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"71.230.141.152","externalIp":"106.67.150.216","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=71.230.141.152 ::: serverIP=106.67.150.216 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-26T16:20:42.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"71.230.141.152\",\"externalIp\":\"106.67.150.216\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=71.230.141.152 ::: serverIP=106.67.150.216 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "71.230.141.152",
"serverIP": "106.67.150.216",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"71.230.141.152","externalIp":"106.67.150.216","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=71.230.141.152 ::: serverIP=106.67.150.216 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"71.230.141.152","externalIp":"106.67.150.216","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=71.230.141.152 ::: serverIP=106.67.150.216 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-26T16:20:42.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 71.230.141.152
serverIP: 106.67.150.216
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"158.159.172.130","externalIp":"185.79.181.180","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=158.159.172.130 ::: serverIP=185.79.181.180 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-26T16:20:42.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"158.159.172.130\",\"externalIp\":\"185.79.181.180\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=158.159.172.130 ::: serverIP=185.79.181.180 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "158.159.172.130",
"serverIP": "185.79.181.180",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"158.159.172.130","externalIp":"185.79.181.180","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=158.159.172.130 ::: serverIP=185.79.181.180 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"158.159.172.130","externalIp":"185.79.181.180","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=158.159.172.130 ::: serverIP=185.79.181.180 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-26T16:20:42.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 158.159.172.130
serverIP: 185.79.181.180
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"119.39.71.26","externalIp":"253.28.198.241","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=119.39.71.26 ::: serverIP=253.28.198.241 ::: userName=bob ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-26T16:20:42.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"119.39.71.26\",\"externalIp\":\"253.28.198.241\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=119.39.71.26 ::: serverIP=253.28.198.241 ::: userName=bob ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "119.39.71.26",
"serverIP": "253.28.198.241",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"119.39.71.26","externalIp":"253.28.198.241","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=119.39.71.26 ::: serverIP=253.28.198.241 ::: userName=bob ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"119.39.71.26","externalIp":"253.28.198.241","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=119.39.71.26 ::: serverIP=253.28.198.241 ::: userName=bob ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-26T16:20:42.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 119.39.71.26
serverIP: 253.28.198.241
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"247.88.65.110","externalIp":"255.186.65.196","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=247.88.65.110 ::: serverIP=255.186.65.196 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-26T16:20:42.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"247.88.65.110\",\"externalIp\":\"255.186.65.196\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=247.88.65.110 ::: serverIP=255.186.65.196 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "247.88.65.110",
"serverIP": "255.186.65.196",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"247.88.65.110","externalIp":"255.186.65.196","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=247.88.65.110 ::: serverIP=255.186.65.196 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"247.88.65.110","externalIp":"255.186.65.196","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=247.88.65.110 ::: serverIP=255.186.65.196 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-26T16:20:42.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 247.88.65.110
serverIP: 255.186.65.196
userName: nighthawk | Explain this syslog message |
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.168.247.190 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=254.46.121.244 spt=43698 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.46.121.244 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 43698,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/auth1.html",
"localhostname": "WAFirewall",
"localstarttime": "1696187180363 ",
"message": "<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.168.247.190 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=254.46.121.244 spt=43698 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36\" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.46.121.244 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:164.92.233.214",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "254.46.121.244",
"serverIP": "104.168.247.190",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.168.247.190 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=254.46.121.244 spt=43698 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.46.121.244 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.168.247.190 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=254.46.121.244 spt=43698 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.46.121.244 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 43698
facilitycode: 23
facilitylabel: local7
fqdn: /auth1.html
localhostname: WAFirewall
localstarttime: 1696187180363
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:164.92.233.214', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 254.46.121.244
serverIP: 104.168.247.190
userName: - | Explain this syslog message |
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=114.20.163.36 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=22.98.254.152 spt=43698 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.98.254.152 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 43698,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/auth1.html",
"localhostname": "WAFirewall",
"localstarttime": "1696187180363 ",
"message": "<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=114.20.163.36 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=22.98.254.152 spt=43698 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36\" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.98.254.152 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:164.92.233.214",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "22.98.254.152",
"serverIP": "114.20.163.36",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=114.20.163.36 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=22.98.254.152 spt=43698 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.98.254.152 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=114.20.163.36 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=22.98.254.152 spt=43698 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.98.254.152 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 43698
facilitycode: 23
facilitylabel: local7
fqdn: /auth1.html
localhostname: WAFirewall
localstarttime: 1696187180363
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:164.92.233.214', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 22.98.254.152
serverIP: 114.20.163.36
userName: - | Explain this syslog message |
<185>Oct 1 14:10:27 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=61.111.215.218 dpt=443 act=DENY msg=["-"] duser="-" src=185.77.173.119 spt=52152 requestMethod="-" app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:10:27 rt=1696187427054 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18aeca628ee-52881a1d cn2=52152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=185.77.173.119 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 52152,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1696187427054 ",
"message": "<185>Oct 1 14:10:27 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=61.111.215.218 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=185.77.173.119 spt=52152 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:10:27 rt=1696187427054 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18aeca628ee-52881a1d cn2=52152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=185.77.173.119 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD",
"ProxyIP:159.223.202.149"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "185.77.173.119",
"serverIP": "61.111.215.218",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 1 14:10:27 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=61.111.215.218 dpt=443 act=DENY msg=["-"] duser="-" src=185.77.173.119 spt=52152 requestMethod="-" app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:10:27 rt=1696187427054 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18aeca628ee-52881a1d cn2=52152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=185.77.173.119 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 1 14:10:27 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=61.111.215.218 dpt=443 act=DENY msg=["-"] duser="-" src=185.77.173.119 spt=52152 requestMethod="-" app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:10:27 rt=1696187427054 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18aeca628ee-52881a1d cn2=52152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=185.77.173.119 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 52152
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1696187427054
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD', 'ProxyIP:159.223.202.149']
vendorcode: 118
streamName: barracuda_waf
clientIP: 185.77.173.119
serverIP: 61.111.215.218
userName: - | Explain this syslog message |
<185>Oct 1 14:10:27 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=132.121.219.248 dpt=443 act=DENY msg=["-"] duser="-" src=147.79.68.25 spt=52152 requestMethod="-" app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:10:27 rt=1696187427054 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18aeca628ee-52881a1d cn2=52152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=147.79.68.25 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 52152,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1696187427054 ",
"message": "<185>Oct 1 14:10:27 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=132.121.219.248 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=147.79.68.25 spt=52152 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:10:27 rt=1696187427054 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18aeca628ee-52881a1d cn2=52152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=147.79.68.25 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD",
"ProxyIP:159.223.202.149"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "147.79.68.25",
"serverIP": "132.121.219.248",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 1 14:10:27 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=132.121.219.248 dpt=443 act=DENY msg=["-"] duser="-" src=147.79.68.25 spt=52152 requestMethod="-" app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:10:27 rt=1696187427054 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18aeca628ee-52881a1d cn2=52152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=147.79.68.25 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 1 14:10:27 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=132.121.219.248 dpt=443 act=DENY msg=["-"] duser="-" src=147.79.68.25 spt=52152 requestMethod="-" app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:10:27 rt=1696187427054 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18aeca628ee-52881a1d cn2=52152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=147.79.68.25 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 52152
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1696187427054
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD', 'ProxyIP:159.223.202.149']
vendorcode: 118
streamName: barracuda_waf
clientIP: 147.79.68.25
serverIP: 132.121.219.248
userName: - | Explain this syslog message |
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=127.246.97.15 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=183.37.200.46 spt=43698 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.37.200.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 43698,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/auth1.html",
"localhostname": "WAFirewall",
"localstarttime": "1696187180363 ",
"message": "<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=127.246.97.15 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=183.37.200.46 spt=43698 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36\" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.37.200.46 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:164.92.233.214",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "183.37.200.46",
"serverIP": "127.246.97.15",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=127.246.97.15 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=183.37.200.46 spt=43698 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.37.200.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=127.246.97.15 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=183.37.200.46 spt=43698 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.37.200.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 43698
facilitycode: 23
facilitylabel: local7
fqdn: /auth1.html
localhostname: WAFirewall
localstarttime: 1696187180363
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:164.92.233.214', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 183.37.200.46
serverIP: 127.246.97.15
userName: - | Explain this syslog message |
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=148.44.69.167 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=189.157.147.113 spt=43704 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180365 request=/sslvpnLogin.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654d-11a1bbd1 cn2=43704 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=189.157.147.113 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 43704,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/sslvpnLogin.html",
"localhostname": "WAFirewall",
"localstarttime": "1696187180365 ",
"message": "<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=148.44.69.167 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=189.157.147.113 spt=43704 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:06:20 rt=1696187180365 request=/sslvpnLogin.html requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36\" dvchost=WAFirewall externalId=18aeca2654d-11a1bbd1 cn2=43704 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=189.157.147.113 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:164.92.233.214",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "189.157.147.113",
"serverIP": "148.44.69.167",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=148.44.69.167 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=189.157.147.113 spt=43704 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180365 request=/sslvpnLogin.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654d-11a1bbd1 cn2=43704 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=189.157.147.113 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=148.44.69.167 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=189.157.147.113 spt=43704 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180365 request=/sslvpnLogin.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654d-11a1bbd1 cn2=43704 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=189.157.147.113 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 43704
facilitycode: 23
facilitylabel: local7
fqdn: /sslvpnLogin.html
localhostname: WAFirewall
localstarttime: 1696187180365
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:164.92.233.214', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 189.157.147.113
serverIP: 148.44.69.167
userName: - | Explain this syslog message |
<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.110.160.191 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=218.197.162.203 spt=50644 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:18 rt=1696187178278 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca25d24-20950c95 cn2=50644 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=218.197.162.203 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 50644,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1696187178278 ",
"message": "<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.110.160.191 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=218.197.162.203 spt=50644 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:06:18 rt=1696187178278 request=/ requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36\" dvchost=WAFirewall externalId=18aeca25d24-20950c95 cn2=50644 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=218.197.162.203 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"ProxyIP:165.232.124.64",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "218.197.162.203",
"serverIP": "162.110.160.191",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.110.160.191 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=218.197.162.203 spt=50644 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:18 rt=1696187178278 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca25d24-20950c95 cn2=50644 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=218.197.162.203 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.110.160.191 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=218.197.162.203 spt=50644 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:18 rt=1696187178278 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca25d24-20950c95 cn2=50644 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=218.197.162.203 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 50644
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1696187178278
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:165.232.124.64', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 218.197.162.203
serverIP: 162.110.160.191
userName: - | Explain this syslog message |
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=95.47.31.182 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.249.180.14 spt=43704 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180365 request=/sslvpnLogin.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654d-11a1bbd1 cn2=43704 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.249.180.14 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 43704,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/sslvpnLogin.html",
"localhostname": "WAFirewall",
"localstarttime": "1696187180365 ",
"message": "<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=95.47.31.182 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=184.249.180.14 spt=43704 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:06:20 rt=1696187180365 request=/sslvpnLogin.html requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36\" dvchost=WAFirewall externalId=18aeca2654d-11a1bbd1 cn2=43704 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.249.180.14 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:164.92.233.214",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "184.249.180.14",
"serverIP": "95.47.31.182",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=95.47.31.182 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.249.180.14 spt=43704 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180365 request=/sslvpnLogin.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654d-11a1bbd1 cn2=43704 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.249.180.14 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=95.47.31.182 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.249.180.14 spt=43704 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180365 request=/sslvpnLogin.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654d-11a1bbd1 cn2=43704 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.249.180.14 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 43704
facilitycode: 23
facilitylabel: local7
fqdn: /sslvpnLogin.html
localhostname: WAFirewall
localstarttime: 1696187180365
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:164.92.233.214', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 184.249.180.14
serverIP: 95.47.31.182
userName: - | Explain this syslog message |
<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=108.122.17.217 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=40.190.129.202 spt=50642 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:18 rt=1696187178276 request=/RDWeb requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca25d18-26915968 cn2=50642 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.190.129.202 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 50642,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/RDWeb",
"localhostname": "WAFirewall",
"localstarttime": "1696187178276 ",
"message": "<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=108.122.17.217 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=40.190.129.202 spt=50642 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:06:18 rt=1696187178276 request=/RDWeb requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36\" dvchost=WAFirewall externalId=18aeca25d18-26915968 cn2=50642 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.190.129.202 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"ProxyIP:165.232.124.64",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "40.190.129.202",
"serverIP": "108.122.17.217",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=108.122.17.217 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=40.190.129.202 spt=50642 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:18 rt=1696187178276 request=/RDWeb requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca25d18-26915968 cn2=50642 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.190.129.202 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=108.122.17.217 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=40.190.129.202 spt=50642 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:18 rt=1696187178276 request=/RDWeb requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca25d18-26915968 cn2=50642 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.190.129.202 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 50642
facilitycode: 23
facilitylabel: local7
fqdn: /RDWeb
localhostname: WAFirewall
localstarttime: 1696187178276
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:165.232.124.64', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 40.190.129.202
serverIP: 108.122.17.217
userName: - | Explain this syslog message |
<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=5.165.16.107 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=200.255.46.255 spt=50642 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:18 rt=1696187178276 request=/RDWeb requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca25d18-26915968 cn2=50642 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=200.255.46.255 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 50642,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/RDWeb",
"localhostname": "WAFirewall",
"localstarttime": "1696187178276 ",
"message": "<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=5.165.16.107 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=200.255.46.255 spt=50642 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:06:18 rt=1696187178276 request=/RDWeb requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36\" dvchost=WAFirewall externalId=18aeca25d18-26915968 cn2=50642 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=200.255.46.255 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"ProxyIP:165.232.124.64",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "200.255.46.255",
"serverIP": "5.165.16.107",
"userName": "-"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.