input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"38.74.31.166","externalIp":"38.74.31.166","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:57:01.000Z"} ::: clientIP=38.74.31.166 ::: serverIP=38.74.31.166 ::: userName=nighthawk ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun", "message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"38.74.31.166\",\"externalIp\":\"38.74.31.166\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:57:01.000Z\"} ::: clientIP=38.74.31.166 ::: serverIP=38.74.31.166 ::: userName=nighthawk ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-11-02T11:57:01.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareEntertainment", "streamName": "OpenDNS Detection", "clientIP": "38.74.31.166", "serverIP": "23.75.150.237", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"38.74.31.166","externalIp":"38.74.31.166","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:57:01.000Z"} ::: clientIP=38.74.31.166 ::: serverIP=38.74.31.166 ::: userName=nighthawk ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"38.74.31.166","externalIp":"38.74.31.166","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:57:01.000Z"} ::: clientIP=38.74.31.166 ::: serverIP=38.74.31.166 ::: userName=nighthawk ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-11-02T11:57:01.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareEntertainment streamName: OpenDNS Detection clientIP: 38.74.31.166 serverIP: 23.75.150.237 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"109.144.155.88","externalIp":"109.144.155.88","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=109.144.155.88 ::: serverIP=109.144.155.88 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"109.144.155.88\",\"externalIp\":\"109.144.155.88\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=109.144.155.88 ::: serverIP=109.144.155.88 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-11-02T11:55:45.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareEntertainment", "streamName": "OpenDNS Detection", "clientIP": "109.144.155.88", "serverIP": "147.86.135.10", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"109.144.155.88","externalIp":"109.144.155.88","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=109.144.155.88 ::: serverIP=109.144.155.88 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"109.144.155.88","externalIp":"109.144.155.88","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=109.144.155.88 ::: serverIP=109.144.155.88 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-11-02T11:55:45.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareEntertainment streamName: OpenDNS Detection clientIP: 109.144.155.88 serverIP: 147.86.135.10 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"63.175.229.16","externalIp":"63.175.229.16","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=63.175.229.16 ::: serverIP=63.175.229.16 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"63.175.229.16\",\"externalIp\":\"63.175.229.16\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=63.175.229.16 ::: serverIP=63.175.229.16 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-11-02T11:55:45.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareEntertainment", "streamName": "OpenDNS Detection", "clientIP": "63.175.229.16", "serverIP": "190.215.187.166", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"63.175.229.16","externalIp":"63.175.229.16","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=63.175.229.16 ::: serverIP=63.175.229.16 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"63.175.229.16","externalIp":"63.175.229.16","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=63.175.229.16 ::: serverIP=63.175.229.16 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-11-02T11:55:45.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareEntertainment streamName: OpenDNS Detection clientIP: 63.175.229.16 serverIP: 190.215.187.166 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"154.149.139.162","externalIp":"154.149.139.162","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:57:01.000Z"} ::: clientIP=154.149.139.162 ::: serverIP=154.149.139.162 ::: userName=janedoe ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun", "message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"154.149.139.162\",\"externalIp\":\"154.149.139.162\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:57:01.000Z\"} ::: clientIP=154.149.139.162 ::: serverIP=154.149.139.162 ::: userName=janedoe ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-11-02T11:57:01.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareEntertainment", "streamName": "OpenDNS Detection", "clientIP": "154.149.139.162", "serverIP": "161.204.115.202", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"154.149.139.162","externalIp":"154.149.139.162","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:57:01.000Z"} ::: clientIP=154.149.139.162 ::: serverIP=154.149.139.162 ::: userName=janedoe ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"154.149.139.162","externalIp":"154.149.139.162","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:57:01.000Z"} ::: clientIP=154.149.139.162 ::: serverIP=154.149.139.162 ::: userName=janedoe ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-11-02T11:57:01.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareEntertainment streamName: OpenDNS Detection clientIP: 154.149.139.162 serverIP: 161.204.115.202 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"93.216.133.239","externalIp":"93.216.133.239","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:57:01.000Z"} ::: clientIP=93.216.133.239 ::: serverIP=93.216.133.239 ::: userName=nighthawk ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun", "message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"93.216.133.239\",\"externalIp\":\"93.216.133.239\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:57:01.000Z\"} ::: clientIP=93.216.133.239 ::: serverIP=93.216.133.239 ::: userName=nighthawk ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-11-02T11:57:01.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareEntertainment", "streamName": "OpenDNS Detection", "clientIP": "93.216.133.239", "serverIP": "78.238.187.114", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"93.216.133.239","externalIp":"93.216.133.239","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:57:01.000Z"} ::: clientIP=93.216.133.239 ::: serverIP=93.216.133.239 ::: userName=nighthawk ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"93.216.133.239","externalIp":"93.216.133.239","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:57:01.000Z"} ::: clientIP=93.216.133.239 ::: serverIP=93.216.133.239 ::: userName=nighthawk ::: created_at=2022-11-02T11:57:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:57:01.000Z ::: serverHostname=cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cdh3u4v9aejvf4o000101jiebeuxbfy7q.oast.fun severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-11-02T11:57:01.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareEntertainment streamName: OpenDNS Detection clientIP: 93.216.133.239 serverIP: 78.238.187.114 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"88.219.180.239","externalIp":"88.219.180.239","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=88.219.180.239 ::: serverIP=88.219.180.239 ::: userName=charlie ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"88.219.180.239\",\"externalIp\":\"88.219.180.239\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=88.219.180.239 ::: serverIP=88.219.180.239 ::: userName=charlie ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-11-02T11:55:45.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareEntertainment", "streamName": "OpenDNS Detection", "clientIP": "88.219.180.239", "serverIP": "3.162.58.145", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"88.219.180.239","externalIp":"88.219.180.239","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=88.219.180.239 ::: serverIP=88.219.180.239 ::: userName=charlie ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"88.219.180.239","externalIp":"88.219.180.239","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=88.219.180.239 ::: serverIP=88.219.180.239 ::: userName=charlie ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-11-02T11:55:45.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareEntertainment streamName: OpenDNS Detection clientIP: 88.219.180.239 serverIP: 3.162.58.145 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"2.171.172.141","externalIp":"2.171.172.141","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=2.171.172.141 ::: serverIP=2.171.172.141 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"2.171.172.141\",\"externalIp\":\"2.171.172.141\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=2.171.172.141 ::: serverIP=2.171.172.141 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-11-02T11:55:45.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareEntertainment", "streamName": "OpenDNS Detection", "clientIP": "2.171.172.141", "serverIP": "208.44.118.135", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"2.171.172.141","externalIp":"2.171.172.141","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=2.171.172.141 ::: serverIP=2.171.172.141 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"2.171.172.141","externalIp":"2.171.172.141","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=2.171.172.141 ::: serverIP=2.171.172.141 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-11-02T11:55:45.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareEntertainment streamName: OpenDNS Detection clientIP: 2.171.172.141 serverIP: 208.44.118.135 userName: bob
Explain this syslog message
<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=100.101.28.212 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=224.215.112.55 spt=13990 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.215.112.55 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 13990, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/comm/SinglePageRegEvent.jsp", "localhostname": "WAFirewall", "localstarttime": "1697778283784 ", "message": "<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=100.101.28.212 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=224.215.112.55 spt=13990 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication=\"Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)\" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.215.112.55 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:185.191.171.8", "GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "224.215.112.55", "serverIP": "100.101.28.212", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=100.101.28.212 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=224.215.112.55 spt=13990 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.215.112.55 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=100.101.28.212 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=224.215.112.55 spt=13990 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.215.112.55 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 13990 facilitycode: 23 facilitylabel: local7 fqdn: /comm/SinglePageRegEvent.jsp localhostname: WAFirewall localstarttime: 1697778283784 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:185.191.171.8', 'GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 224.215.112.55 serverIP: 100.101.28.212 userName: -
Explain this syslog message
<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=180.121.224.234 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=113.2.123.242 spt=13990 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=113.2.123.242 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 13990, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/comm/SinglePageRegEvent.jsp", "localhostname": "WAFirewall", "localstarttime": "1697778283784 ", "message": "<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=180.121.224.234 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=113.2.123.242 spt=13990 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication=\"Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)\" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=113.2.123.242 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:185.191.171.8", "GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "113.2.123.242", "serverIP": "180.121.224.234", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=180.121.224.234 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=113.2.123.242 spt=13990 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=113.2.123.242 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=180.121.224.234 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=113.2.123.242 spt=13990 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=113.2.123.242 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 13990 facilitycode: 23 facilitylabel: local7 fqdn: /comm/SinglePageRegEvent.jsp localhostname: WAFirewall localstarttime: 1697778283784 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:185.191.171.8', 'GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 113.2.123.242 serverIP: 180.121.224.234 userName: -
Explain this syslog message
<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.103.73.124 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.169.24.234 spt=13990 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.169.24.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 13990, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/comm/SinglePageRegEvent.jsp", "localhostname": "WAFirewall", "localstarttime": "1697778283784 ", "message": "<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.103.73.124 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=159.169.24.234 spt=13990 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication=\"Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)\" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.169.24.234 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:185.191.171.8", "GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "159.169.24.234", "serverIP": "73.103.73.124", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.103.73.124 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.169.24.234 spt=13990 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.169.24.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 20 00:04:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.103.73.124 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.169.24.234 spt=13990 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 20 2023 00:04:43 rt=1697778283784 request=/comm/SinglePageRegEvent.jsp requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=18b4b78b508-46cb56c8 cn2=13990 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.169.24.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 13990 facilitycode: 23 facilitylabel: local7 fqdn: /comm/SinglePageRegEvent.jsp localhostname: WAFirewall localstarttime: 1697778283784 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:185.191.171.8', 'GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 159.169.24.234 serverIP: 73.103.73.124 userName: -
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=124.34.155.151 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\charlie\Downloads\PSTools\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b", "filename": "PsExec.exe", "filepath": "\\Device\\HarddiskVolume1\\Users\\INFRDEV-pentest\\Downloads\\PSTools\\PsExec.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T18:24:34Z\",\"template_instance_id\":\"1384\",\"behavior_id\":\"10447\",\"filename\":\"PsExec.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Users\\\\charlie\\\\Downloads\\\\PSTools\\\\PsExec.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\charlie\\\\Downloads\\\\PSTools\\\\PsExec.exe\\\" -i -s cmd.exe\",\"scenario\":\"suspicious_activity\",\"objective\":\"Gain Access\",\"tactic\":\"Privilege Escalation\",\"tactic_id\":\"TA0004\",\"technique\":\"Abuse Elevation Control Mechanism\",\"technique_id\":\"T1548\",\"display_name\":\"SuspiciousPrivEsc\",\"description\":\"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.\",\"severity\":30,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"charlie\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738\",\"sha256\":\"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b\",\"md5\":\"24a648a48741b1ac809e47b9543c6f12\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426\"},\"pattern_disposition\":0,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=124.34.155.151 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T18:24:34Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "124.34.155.151", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=124.34.155.151 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\charlie\Downloads\PSTools\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=124.34.155.151 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\charlie\Downloads\PSTools\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b filename: PsExec.exe filepath: \Device\HarddiskVolume1\Users\INFRDEV-pentest\Downloads\PSTools\PsExec.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T18:24:34Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 124.34.155.151 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=123.249.121.248 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\charlie\Downloads\PSTools\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b", "filename": "PsExec.exe", "filepath": "\\Device\\HarddiskVolume1\\Users\\INFRDEV-pentest\\Downloads\\PSTools\\PsExec.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T18:24:34Z\",\"template_instance_id\":\"1384\",\"behavior_id\":\"10447\",\"filename\":\"PsExec.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Users\\\\charlie\\\\Downloads\\\\PSTools\\\\PsExec.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\charlie\\\\Downloads\\\\PSTools\\\\PsExec.exe\\\" -i -s cmd.exe\",\"scenario\":\"suspicious_activity\",\"objective\":\"Gain Access\",\"tactic\":\"Privilege Escalation\",\"tactic_id\":\"TA0004\",\"technique\":\"Abuse Elevation Control Mechanism\",\"technique_id\":\"T1548\",\"display_name\":\"SuspiciousPrivEsc\",\"description\":\"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.\",\"severity\":30,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"charlie\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738\",\"sha256\":\"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b\",\"md5\":\"24a648a48741b1ac809e47b9543c6f12\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426\"},\"pattern_disposition\":0,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=123.249.121.248 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T18:24:34Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "123.249.121.248", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=123.249.121.248 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\charlie\Downloads\PSTools\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=123.249.121.248 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\charlie\Downloads\PSTools\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b filename: PsExec.exe filepath: \Device\HarddiskVolume1\Users\INFRDEV-pentest\Downloads\PSTools\PsExec.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T18:24:34Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 123.249.121.248 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=155.37.92.190 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf", "filename": "reg.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-09T17:21:58Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\reg.exe\\\" query HKLM/f password /t REG_SZ /s\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-21-3008783154-4189408168-2363429128-1618\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=155.37.92.190 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-09T17:21:58Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "155.37.92.190", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=155.37.92.190 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=155.37.92.190 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf filename: reg.exe filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-09T17:21:58Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 155.37.92.190 userName: alice
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"janedoe","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=223.63.128.243 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf", "filename": "reg.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-09T17:21:58Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\reg.exe\\\" query HKLM/f password /t REG_SZ /s\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"janedoe\",\"user_id\":\"S-1-5-21-3008783154-4189408168-2363429128-1618\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=223.63.128.243 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-09T17:21:58Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "223.63.128.243", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"janedoe","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=223.63.128.243 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"janedoe","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=223.63.128.243 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf filename: reg.exe filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-09T17:21:58Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 223.63.128.243 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"10.175.93.140","externalIp":"60.3.14.91","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=10.175.93.140 ::: serverIP=60.3.14.91 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-26T16:20:42.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"10.175.93.140\",\"externalIp\":\"60.3.14.91\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=10.175.93.140 ::: serverIP=60.3.14.91 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "10.175.93.140", "serverIP": "60.3.14.91", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"10.175.93.140","externalIp":"60.3.14.91","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=10.175.93.140 ::: serverIP=60.3.14.91 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"10.175.93.140","externalIp":"60.3.14.91","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=10.175.93.140 ::: serverIP=60.3.14.91 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-26T16:20:42.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 10.175.93.140 serverIP: 60.3.14.91 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"27.206.193.197","externalIp":"139.191.123.160","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=27.206.193.197 ::: serverIP=139.191.123.160 ::: userName=fish ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-26T16:20:42.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"27.206.193.197\",\"externalIp\":\"139.191.123.160\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=27.206.193.197 ::: serverIP=139.191.123.160 ::: userName=fish ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "27.206.193.197", "serverIP": "139.191.123.160", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"27.206.193.197","externalIp":"139.191.123.160","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=27.206.193.197 ::: serverIP=139.191.123.160 ::: userName=fish ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"27.206.193.197","externalIp":"139.191.123.160","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=27.206.193.197 ::: serverIP=139.191.123.160 ::: userName=fish ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-26T16:20:42.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 27.206.193.197 serverIP: 139.191.123.160 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"74.178.4.29","externalIp":"39.193.68.3","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=74.178.4.29 ::: serverIP=39.193.68.3 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-26T16:20:42.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"74.178.4.29\",\"externalIp\":\"39.193.68.3\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=74.178.4.29 ::: serverIP=39.193.68.3 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "74.178.4.29", "serverIP": "39.193.68.3", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"74.178.4.29","externalIp":"39.193.68.3","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=74.178.4.29 ::: serverIP=39.193.68.3 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"74.178.4.29","externalIp":"39.193.68.3","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=74.178.4.29 ::: serverIP=39.193.68.3 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-26T16:20:42.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 74.178.4.29 serverIP: 39.193.68.3 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"49.204.64.161","externalIp":"30.68.12.47","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=49.204.64.161 ::: serverIP=30.68.12.47 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-26T16:20:42.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"49.204.64.161\",\"externalIp\":\"30.68.12.47\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=49.204.64.161 ::: serverIP=30.68.12.47 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "49.204.64.161", "serverIP": "30.68.12.47", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"49.204.64.161","externalIp":"30.68.12.47","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=49.204.64.161 ::: serverIP=30.68.12.47 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"49.204.64.161","externalIp":"30.68.12.47","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=49.204.64.161 ::: serverIP=30.68.12.47 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-26T16:20:42.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 49.204.64.161 serverIP: 30.68.12.47 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"46.26.204.157","externalIp":"117.205.87.4","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=46.26.204.157 ::: serverIP=117.205.87.4 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-26T16:20:42.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"46.26.204.157\",\"externalIp\":\"117.205.87.4\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=46.26.204.157 ::: serverIP=117.205.87.4 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "46.26.204.157", "serverIP": "117.205.87.4", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"46.26.204.157","externalIp":"117.205.87.4","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=46.26.204.157 ::: serverIP=117.205.87.4 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"46.26.204.157","externalIp":"117.205.87.4","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=46.26.204.157 ::: serverIP=117.205.87.4 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-26T16:20:42.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 46.26.204.157 serverIP: 117.205.87.4 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"221.185.25.241","externalIp":"30.107.165.206","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=221.185.25.241 ::: serverIP=30.107.165.206 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-26T16:20:42.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"221.185.25.241\",\"externalIp\":\"30.107.165.206\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=221.185.25.241 ::: serverIP=30.107.165.206 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "221.185.25.241", "serverIP": "30.107.165.206", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"221.185.25.241","externalIp":"30.107.165.206","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=221.185.25.241 ::: serverIP=30.107.165.206 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"221.185.25.241","externalIp":"30.107.165.206","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=221.185.25.241 ::: serverIP=30.107.165.206 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-26T16:20:42.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 221.185.25.241 serverIP: 30.107.165.206 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"71.230.141.152","externalIp":"106.67.150.216","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=71.230.141.152 ::: serverIP=106.67.150.216 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-26T16:20:42.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"71.230.141.152\",\"externalIp\":\"106.67.150.216\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=71.230.141.152 ::: serverIP=106.67.150.216 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "71.230.141.152", "serverIP": "106.67.150.216", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"71.230.141.152","externalIp":"106.67.150.216","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=71.230.141.152 ::: serverIP=106.67.150.216 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"71.230.141.152","externalIp":"106.67.150.216","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=71.230.141.152 ::: serverIP=106.67.150.216 ::: userName=charlie ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-26T16:20:42.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 71.230.141.152 serverIP: 106.67.150.216 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"158.159.172.130","externalIp":"185.79.181.180","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=158.159.172.130 ::: serverIP=185.79.181.180 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-26T16:20:42.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"158.159.172.130\",\"externalIp\":\"185.79.181.180\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=158.159.172.130 ::: serverIP=185.79.181.180 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "158.159.172.130", "serverIP": "185.79.181.180", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"158.159.172.130","externalIp":"185.79.181.180","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=158.159.172.130 ::: serverIP=185.79.181.180 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"158.159.172.130","externalIp":"185.79.181.180","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=158.159.172.130 ::: serverIP=185.79.181.180 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-26T16:20:42.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 158.159.172.130 serverIP: 185.79.181.180 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"119.39.71.26","externalIp":"253.28.198.241","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=119.39.71.26 ::: serverIP=253.28.198.241 ::: userName=bob ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-26T16:20:42.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"119.39.71.26\",\"externalIp\":\"253.28.198.241\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=119.39.71.26 ::: serverIP=253.28.198.241 ::: userName=bob ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "119.39.71.26", "serverIP": "253.28.198.241", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"119.39.71.26","externalIp":"253.28.198.241","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=119.39.71.26 ::: serverIP=253.28.198.241 ::: userName=bob ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"119.39.71.26","externalIp":"253.28.198.241","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=119.39.71.26 ::: serverIP=253.28.198.241 ::: userName=bob ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-26T16:20:42.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 119.39.71.26 serverIP: 253.28.198.241 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"247.88.65.110","externalIp":"255.186.65.196","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=247.88.65.110 ::: serverIP=255.186.65.196 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-26T16:20:42.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"247.88.65.110\",\"externalIp\":\"255.186.65.196\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-26T16:20:42.000Z\"} ::: clientIP=247.88.65.110 ::: serverIP=255.186.65.196 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "247.88.65.110", "serverIP": "255.186.65.196", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"247.88.65.110","externalIp":"255.186.65.196","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=247.88.65.110 ::: serverIP=255.186.65.196 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"247.88.65.110","externalIp":"255.186.65.196","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-26T16:20:42.000Z"} ::: clientIP=247.88.65.110 ::: serverIP=255.186.65.196 ::: userName=nighthawk ::: created_at=2022-07-26T16:20:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-26T16:20:42.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-26T16:20:42.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 247.88.65.110 serverIP: 255.186.65.196 userName: nighthawk
Explain this syslog message
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.168.247.190 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=254.46.121.244 spt=43698 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.46.121.244 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 43698, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/auth1.html", "localhostname": "WAFirewall", "localstarttime": "1696187180363 ", "message": "<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.168.247.190 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=254.46.121.244 spt=43698 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36\" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.46.121.244 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "ProxyIP:164.92.233.214", "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "254.46.121.244", "serverIP": "104.168.247.190", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.168.247.190 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=254.46.121.244 spt=43698 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.46.121.244 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.168.247.190 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=254.46.121.244 spt=43698 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.46.121.244 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 43698 facilitycode: 23 facilitylabel: local7 fqdn: /auth1.html localhostname: WAFirewall localstarttime: 1696187180363 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['ProxyIP:164.92.233.214', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 254.46.121.244 serverIP: 104.168.247.190 userName: -
Explain this syslog message
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=114.20.163.36 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=22.98.254.152 spt=43698 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.98.254.152 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 43698, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/auth1.html", "localhostname": "WAFirewall", "localstarttime": "1696187180363 ", "message": "<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=114.20.163.36 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=22.98.254.152 spt=43698 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36\" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.98.254.152 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "ProxyIP:164.92.233.214", "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "22.98.254.152", "serverIP": "114.20.163.36", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=114.20.163.36 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=22.98.254.152 spt=43698 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.98.254.152 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=114.20.163.36 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=22.98.254.152 spt=43698 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.98.254.152 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 43698 facilitycode: 23 facilitylabel: local7 fqdn: /auth1.html localhostname: WAFirewall localstarttime: 1696187180363 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['ProxyIP:164.92.233.214', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 22.98.254.152 serverIP: 114.20.163.36 userName: -
Explain this syslog message
<185>Oct 1 14:10:27 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=61.111.215.218 dpt=443 act=DENY msg=["-"] duser="-" src=185.77.173.119 spt=52152 requestMethod="-" app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:10:27 rt=1696187427054 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18aeca628ee-52881a1d cn2=52152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=185.77.173.119 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 52152, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1696187427054 ", "message": "<185>Oct 1 14:10:27 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=61.111.215.218 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=185.77.173.119 spt=52152 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:10:27 rt=1696187427054 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18aeca628ee-52881a1d cn2=52152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=185.77.173.119 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "INVALID_METHOD", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD", "ProxyIP:159.223.202.149" ], "vendorcode": "118", "streamName": "barracuda_waf", "clientIP": "185.77.173.119", "serverIP": "61.111.215.218", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 1 14:10:27 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=61.111.215.218 dpt=443 act=DENY msg=["-"] duser="-" src=185.77.173.119 spt=52152 requestMethod="-" app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:10:27 rt=1696187427054 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18aeca628ee-52881a1d cn2=52152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=185.77.173.119 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 1 14:10:27 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=61.111.215.218 dpt=443 act=DENY msg=["-"] duser="-" src=185.77.173.119 spt=52152 requestMethod="-" app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:10:27 rt=1696187427054 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18aeca628ee-52881a1d cn2=52152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=185.77.173.119 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 52152 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1696187427054 messagetype: INVALID_METHOD priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD', 'ProxyIP:159.223.202.149'] vendorcode: 118 streamName: barracuda_waf clientIP: 185.77.173.119 serverIP: 61.111.215.218 userName: -
Explain this syslog message
<185>Oct 1 14:10:27 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=132.121.219.248 dpt=443 act=DENY msg=["-"] duser="-" src=147.79.68.25 spt=52152 requestMethod="-" app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:10:27 rt=1696187427054 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18aeca628ee-52881a1d cn2=52152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=147.79.68.25 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 52152, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1696187427054 ", "message": "<185>Oct 1 14:10:27 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=132.121.219.248 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=147.79.68.25 spt=52152 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:10:27 rt=1696187427054 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18aeca628ee-52881a1d cn2=52152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=147.79.68.25 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "INVALID_METHOD", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD", "ProxyIP:159.223.202.149" ], "vendorcode": "118", "streamName": "barracuda_waf", "clientIP": "147.79.68.25", "serverIP": "132.121.219.248", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 1 14:10:27 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=132.121.219.248 dpt=443 act=DENY msg=["-"] duser="-" src=147.79.68.25 spt=52152 requestMethod="-" app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:10:27 rt=1696187427054 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18aeca628ee-52881a1d cn2=52152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=147.79.68.25 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 1 14:10:27 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=132.121.219.248 dpt=443 act=DENY msg=["-"] duser="-" src=147.79.68.25 spt=52152 requestMethod="-" app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:10:27 rt=1696187427054 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18aeca628ee-52881a1d cn2=52152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=147.79.68.25 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 52152 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1696187427054 messagetype: INVALID_METHOD priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD', 'ProxyIP:159.223.202.149'] vendorcode: 118 streamName: barracuda_waf clientIP: 147.79.68.25 serverIP: 132.121.219.248 userName: -
Explain this syslog message
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=127.246.97.15 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=183.37.200.46 spt=43698 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.37.200.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 43698, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/auth1.html", "localhostname": "WAFirewall", "localstarttime": "1696187180363 ", "message": "<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=127.246.97.15 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=183.37.200.46 spt=43698 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36\" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.37.200.46 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "ProxyIP:164.92.233.214", "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "183.37.200.46", "serverIP": "127.246.97.15", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=127.246.97.15 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=183.37.200.46 spt=43698 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.37.200.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=127.246.97.15 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=183.37.200.46 spt=43698 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180363 request=/auth1.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654a-1d993e80 cn2=43698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.37.200.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 43698 facilitycode: 23 facilitylabel: local7 fqdn: /auth1.html localhostname: WAFirewall localstarttime: 1696187180363 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['ProxyIP:164.92.233.214', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 183.37.200.46 serverIP: 127.246.97.15 userName: -
Explain this syslog message
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=148.44.69.167 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=189.157.147.113 spt=43704 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180365 request=/sslvpnLogin.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654d-11a1bbd1 cn2=43704 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=189.157.147.113 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 43704, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/sslvpnLogin.html", "localhostname": "WAFirewall", "localstarttime": "1696187180365 ", "message": "<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=148.44.69.167 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=189.157.147.113 spt=43704 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:06:20 rt=1696187180365 request=/sslvpnLogin.html requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36\" dvchost=WAFirewall externalId=18aeca2654d-11a1bbd1 cn2=43704 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=189.157.147.113 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "ProxyIP:164.92.233.214", "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "189.157.147.113", "serverIP": "148.44.69.167", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=148.44.69.167 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=189.157.147.113 spt=43704 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180365 request=/sslvpnLogin.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654d-11a1bbd1 cn2=43704 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=189.157.147.113 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=148.44.69.167 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=189.157.147.113 spt=43704 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180365 request=/sslvpnLogin.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654d-11a1bbd1 cn2=43704 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=189.157.147.113 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 43704 facilitycode: 23 facilitylabel: local7 fqdn: /sslvpnLogin.html localhostname: WAFirewall localstarttime: 1696187180365 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['ProxyIP:164.92.233.214', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 189.157.147.113 serverIP: 148.44.69.167 userName: -
Explain this syslog message
<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.110.160.191 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=218.197.162.203 spt=50644 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:18 rt=1696187178278 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca25d24-20950c95 cn2=50644 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=218.197.162.203 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 50644, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1696187178278 ", "message": "<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.110.160.191 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=218.197.162.203 spt=50644 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:06:18 rt=1696187178278 request=/ requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36\" dvchost=WAFirewall externalId=18aeca25d24-20950c95 cn2=50644 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=218.197.162.203 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "ProxyIP:165.232.124.64", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "218.197.162.203", "serverIP": "162.110.160.191", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.110.160.191 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=218.197.162.203 spt=50644 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:18 rt=1696187178278 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca25d24-20950c95 cn2=50644 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=218.197.162.203 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.110.160.191 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=218.197.162.203 spt=50644 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:18 rt=1696187178278 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca25d24-20950c95 cn2=50644 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=218.197.162.203 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 50644 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1696187178278 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:165.232.124.64', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 218.197.162.203 serverIP: 162.110.160.191 userName: -
Explain this syslog message
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=95.47.31.182 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.249.180.14 spt=43704 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180365 request=/sslvpnLogin.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654d-11a1bbd1 cn2=43704 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.249.180.14 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 43704, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/sslvpnLogin.html", "localhostname": "WAFirewall", "localstarttime": "1696187180365 ", "message": "<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=95.47.31.182 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=184.249.180.14 spt=43704 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:06:20 rt=1696187180365 request=/sslvpnLogin.html requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36\" dvchost=WAFirewall externalId=18aeca2654d-11a1bbd1 cn2=43704 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.249.180.14 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "ProxyIP:164.92.233.214", "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "184.249.180.14", "serverIP": "95.47.31.182", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=95.47.31.182 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.249.180.14 spt=43704 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180365 request=/sslvpnLogin.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654d-11a1bbd1 cn2=43704 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.249.180.14 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 1 14:06:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=95.47.31.182 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.249.180.14 spt=43704 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:20 rt=1696187180365 request=/sslvpnLogin.html requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca2654d-11a1bbd1 cn2=43704 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.249.180.14 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 43704 facilitycode: 23 facilitylabel: local7 fqdn: /sslvpnLogin.html localhostname: WAFirewall localstarttime: 1696187180365 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['ProxyIP:164.92.233.214', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 184.249.180.14 serverIP: 95.47.31.182 userName: -
Explain this syslog message
<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=108.122.17.217 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=40.190.129.202 spt=50642 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:18 rt=1696187178276 request=/RDWeb requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca25d18-26915968 cn2=50642 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.190.129.202 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 50642, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/RDWeb", "localhostname": "WAFirewall", "localstarttime": "1696187178276 ", "message": "<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=108.122.17.217 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=40.190.129.202 spt=50642 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:06:18 rt=1696187178276 request=/RDWeb requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36\" dvchost=WAFirewall externalId=18aeca25d18-26915968 cn2=50642 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.190.129.202 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "ProxyIP:165.232.124.64", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "40.190.129.202", "serverIP": "108.122.17.217", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=108.122.17.217 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=40.190.129.202 spt=50642 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:18 rt=1696187178276 request=/RDWeb requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca25d18-26915968 cn2=50642 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.190.129.202 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=108.122.17.217 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=40.190.129.202 spt=50642 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:18 rt=1696187178276 request=/RDWeb requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca25d18-26915968 cn2=50642 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.190.129.202 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 50642 facilitycode: 23 facilitylabel: local7 fqdn: /RDWeb localhostname: WAFirewall localstarttime: 1696187178276 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:165.232.124.64', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 40.190.129.202 serverIP: 108.122.17.217 userName: -
Explain this syslog message
<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=5.165.16.107 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=200.255.46.255 spt=50642 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 01 2023 14:06:18 rt=1696187178276 request=/RDWeb requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" dvchost=WAFirewall externalId=18aeca25d18-26915968 cn2=50642 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=200.255.46.255 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 50642, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/RDWeb", "localhostname": "WAFirewall", "localstarttime": "1696187178276 ", "message": "<185>Oct 1 14:06:18 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=5.165.16.107 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=200.255.46.255 spt=50642 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 01 2023 14:06:18 rt=1696187178276 request=/RDWeb requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36\" dvchost=WAFirewall externalId=18aeca25d18-26915968 cn2=50642 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=200.255.46.255 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "ProxyIP:165.232.124.64", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "200.255.46.255", "serverIP": "5.165.16.107", "userName": "-" }
Create a JSON artifact from the message