input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=www.centervilleautorepairshop.us ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"201.227.25.53","externalIp":"242.176.105.109","categories":["Malware"],"tags":[],"destination":"www.centervilleautorepairshop.us","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-16T12:41:21.000Z"} ::: clientIP=201.227.25.53 ::: serverIP=242.176.105.109 ::: userName=janedoe ::: created_at=2023-01-16T12:41:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T12:41:21.000Z ::: serverHostname=www.centervilleautorepairshop.us ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-16T12:41:21.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.centervilleautorepairshop.us ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"201.227.25.53\",\"externalIp\":\"242.176.105.109\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.centervilleautorepairshop.us\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T12:41:21.000Z\"} ::: clientIP=201.227.25.53 ::: serverIP=242.176.105.109 ::: userName=janedoe ::: created_at=2023-01-16T12:41:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T12:41:21.000Z ::: serverHostname=www.centervilleautorepairshop.us ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.centervilleautorepairshop.us",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.centervilleautorepairshop.us",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "201.227.25.53",
"serverIP": "242.176.105.109",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.centervilleautorepairshop.us ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"201.227.25.53","externalIp":"242.176.105.109","categories":["Malware"],"tags":[],"destination":"www.centervilleautorepairshop.us","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-16T12:41:21.000Z"} ::: clientIP=201.227.25.53 ::: serverIP=242.176.105.109 ::: userName=janedoe ::: created_at=2023-01-16T12:41:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T12:41:21.000Z ::: serverHostname=www.centervilleautorepairshop.us ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.centervilleautorepairshop.us ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"201.227.25.53","externalIp":"242.176.105.109","categories":["Malware"],"tags":[],"destination":"www.centervilleautorepairshop.us","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-16T12:41:21.000Z"} ::: clientIP=201.227.25.53 ::: serverIP=242.176.105.109 ::: userName=janedoe ::: created_at=2023-01-16T12:41:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T12:41:21.000Z ::: serverHostname=www.centervilleautorepairshop.us ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-16T12:41:21.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.centervilleautorepairshop.us
messagetype: firewall_action
severitycode: 2
fqdn: www.centervilleautorepairshop.us
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 201.227.25.53
serverIP: 242.176.105.109
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"93.97.44.184","externalIp":"234.35.117.54","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-02T13:11:07.000Z"} ::: clientIP=93.97.44.184 ::: serverIP=234.35.117.54 ::: userName=bob ::: created_at=2023-02-02T13:11:07.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T13:11:07.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-02T13:11:07.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"93.97.44.184\",\"externalIp\":\"234.35.117.54\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-02T13:11:07.000Z\"} ::: clientIP=93.97.44.184 ::: serverIP=234.35.117.54 ::: userName=bob ::: created_at=2023-02-02T13:11:07.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T13:11:07.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "PhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "93.97.44.184",
"serverIP": "234.35.117.54",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"93.97.44.184","externalIp":"234.35.117.54","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-02T13:11:07.000Z"} ::: clientIP=93.97.44.184 ::: serverIP=234.35.117.54 ::: userName=bob ::: created_at=2023-02-02T13:11:07.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T13:11:07.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"93.97.44.184","externalIp":"234.35.117.54","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-02T13:11:07.000Z"} ::: clientIP=93.97.44.184 ::: serverIP=234.35.117.54 ::: userName=bob ::: created_at=2023-02-02T13:11:07.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T13:11:07.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-02T13:11:07.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: PhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 93.97.44.184
serverIP: 234.35.117.54
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"179.250.61.102","externalIp":"184.16.232.93","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-02-02T13:11:07.000Z"} ::: clientIP=179.250.61.102 ::: serverIP=184.16.232.93 ::: userName=charlie ::: created_at=2023-02-02T13:11:07.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T13:11:07.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-02T13:11:07.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"179.250.61.102\",\"externalIp\":\"184.16.232.93\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-02T13:11:07.000Z\"} ::: clientIP=179.250.61.102 ::: serverIP=184.16.232.93 ::: userName=charlie ::: created_at=2023-02-02T13:11:07.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T13:11:07.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "PhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "179.250.61.102",
"serverIP": "184.16.232.93",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"179.250.61.102","externalIp":"184.16.232.93","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-02-02T13:11:07.000Z"} ::: clientIP=179.250.61.102 ::: serverIP=184.16.232.93 ::: userName=charlie ::: created_at=2023-02-02T13:11:07.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T13:11:07.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"179.250.61.102","externalIp":"184.16.232.93","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-02-02T13:11:07.000Z"} ::: clientIP=179.250.61.102 ::: serverIP=184.16.232.93 ::: userName=charlie ::: created_at=2023-02-02T13:11:07.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T13:11:07.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-02T13:11:07.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: PhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 179.250.61.102
serverIP: 184.16.232.93
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=clergymanwonderful.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"146.86.71.239","externalIp":"230.234.88.173","categories":["Malware"],"tags":[],"destination":"clergymanwonderful.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-12-06T15:45:18.000Z"} ::: clientIP=146.86.71.239 ::: serverIP=230.234.88.173 ::: userName=janedoe ::: created_at=2022-12-06T15:45:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-06T15:45:18.000Z ::: serverHostname=clergymanwonderful.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-06T15:45:18.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=clergymanwonderful.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"146.86.71.239\",\"externalIp\":\"230.234.88.173\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"clergymanwonderful.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-06T15:45:18.000Z\"} ::: clientIP=146.86.71.239 ::: serverIP=230.234.88.173 ::: userName=janedoe ::: created_at=2022-12-06T15:45:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-06T15:45:18.000Z ::: serverHostname=clergymanwonderful.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "clergymanwonderful.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "clergymanwonderful.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "146.86.71.239",
"serverIP": "230.234.88.173",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=clergymanwonderful.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"146.86.71.239","externalIp":"230.234.88.173","categories":["Malware"],"tags":[],"destination":"clergymanwonderful.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-12-06T15:45:18.000Z"} ::: clientIP=146.86.71.239 ::: serverIP=230.234.88.173 ::: userName=janedoe ::: created_at=2022-12-06T15:45:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-06T15:45:18.000Z ::: serverHostname=clergymanwonderful.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=clergymanwonderful.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"146.86.71.239","externalIp":"230.234.88.173","categories":["Malware"],"tags":[],"destination":"clergymanwonderful.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-12-06T15:45:18.000Z"} ::: clientIP=146.86.71.239 ::: serverIP=230.234.88.173 ::: userName=janedoe ::: created_at=2022-12-06T15:45:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-06T15:45:18.000Z ::: serverHostname=clergymanwonderful.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-06T15:45:18.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: clergymanwonderful.com
messagetype: firewall_action
severitycode: 2
fqdn: clergymanwonderful.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 146.86.71.239
serverIP: 230.234.88.173
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=clergymanwonderful.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"168.244.46.148","externalIp":"185.72.80.84","categories":["Malware"],"tags":[],"destination":"clergymanwonderful.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-06T15:45:18.000Z"} ::: clientIP=168.244.46.148 ::: serverIP=185.72.80.84 ::: userName=fish ::: created_at=2022-12-06T15:45:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-06T15:45:18.000Z ::: serverHostname=clergymanwonderful.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-06T15:45:18.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=clergymanwonderful.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"168.244.46.148\",\"externalIp\":\"185.72.80.84\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"clergymanwonderful.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-06T15:45:18.000Z\"} ::: clientIP=168.244.46.148 ::: serverIP=185.72.80.84 ::: userName=fish ::: created_at=2022-12-06T15:45:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-06T15:45:18.000Z ::: serverHostname=clergymanwonderful.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "clergymanwonderful.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "clergymanwonderful.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "168.244.46.148",
"serverIP": "185.72.80.84",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=clergymanwonderful.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"168.244.46.148","externalIp":"185.72.80.84","categories":["Malware"],"tags":[],"destination":"clergymanwonderful.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-06T15:45:18.000Z"} ::: clientIP=168.244.46.148 ::: serverIP=185.72.80.84 ::: userName=fish ::: created_at=2022-12-06T15:45:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-06T15:45:18.000Z ::: serverHostname=clergymanwonderful.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=clergymanwonderful.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"168.244.46.148","externalIp":"185.72.80.84","categories":["Malware"],"tags":[],"destination":"clergymanwonderful.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-06T15:45:18.000Z"} ::: clientIP=168.244.46.148 ::: serverIP=185.72.80.84 ::: userName=fish ::: created_at=2022-12-06T15:45:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-06T15:45:18.000Z ::: serverHostname=clergymanwonderful.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-06T15:45:18.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: clergymanwonderful.com
messagetype: firewall_action
severitycode: 2
fqdn: clergymanwonderful.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 168.244.46.148
serverIP: 185.72.80.84
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"131.75.250.48","externalIp":"8.215.178.236","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-24T17:28:19.000Z"} ::: clientIP=131.75.250.48 ::: serverIP=8.215.178.236 ::: userName=bob ::: created_at=2023-01-24T17:28:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:28:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-24T17:28:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"131.75.250.48\",\"externalIp\":\"8.215.178.236\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:28:19.000Z\"} ::: clientIP=131.75.250.48 ::: serverIP=8.215.178.236 ::: userName=bob ::: created_at=2023-01-24T17:28:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:28:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "MalwareOnline TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "131.75.250.48",
"serverIP": "8.215.178.236",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"131.75.250.48","externalIp":"8.215.178.236","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-24T17:28:19.000Z"} ::: clientIP=131.75.250.48 ::: serverIP=8.215.178.236 ::: userName=bob ::: created_at=2023-01-24T17:28:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:28:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"131.75.250.48","externalIp":"8.215.178.236","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-24T17:28:19.000Z"} ::: clientIP=131.75.250.48 ::: serverIP=8.215.178.236 ::: userName=bob ::: created_at=2023-01-24T17:28:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:28:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-24T17:28:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: MalwareOnline TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 131.75.250.48
serverIP: 8.215.178.236
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"6.221.138.200","externalIp":"151.31.67.210","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-24T17:28:19.000Z"} ::: clientIP=6.221.138.200 ::: serverIP=151.31.67.210 ::: userName=janedoe ::: created_at=2023-01-24T17:28:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:28:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-24T17:28:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"6.221.138.200\",\"externalIp\":\"151.31.67.210\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:28:19.000Z\"} ::: clientIP=6.221.138.200 ::: serverIP=151.31.67.210 ::: userName=janedoe ::: created_at=2023-01-24T17:28:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:28:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "MalwareOnline TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "6.221.138.200",
"serverIP": "151.31.67.210",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"6.221.138.200","externalIp":"151.31.67.210","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-24T17:28:19.000Z"} ::: clientIP=6.221.138.200 ::: serverIP=151.31.67.210 ::: userName=janedoe ::: created_at=2023-01-24T17:28:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:28:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"6.221.138.200","externalIp":"151.31.67.210","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-24T17:28:19.000Z"} ::: clientIP=6.221.138.200 ::: serverIP=151.31.67.210 ::: userName=janedoe ::: created_at=2023-01-24T17:28:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:28:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-24T17:28:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: MalwareOnline TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 6.221.138.200
serverIP: 151.31.67.210
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"119.10.80.23","externalIp":"119.10.80.23","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=119.10.80.23 ::: serverIP=119.10.80.23 ::: userName=bob ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-24T17:19:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"119.10.80.23\",\"externalIp\":\"119.10.80.23\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:19:19.000Z\"} ::: clientIP=119.10.80.23 ::: serverIP=119.10.80.23 ::: userName=bob ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "MalwareOnline TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "119.10.80.23",
"serverIP": "90.79.60.233",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"119.10.80.23","externalIp":"119.10.80.23","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=119.10.80.23 ::: serverIP=119.10.80.23 ::: userName=bob ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"119.10.80.23","externalIp":"119.10.80.23","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=119.10.80.23 ::: serverIP=119.10.80.23 ::: userName=bob ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-24T17:19:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: MalwareOnline TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 119.10.80.23
serverIP: 90.79.60.233
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"137.64.59.218","externalIp":"137.64.59.218","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=137.64.59.218 ::: serverIP=137.64.59.218 ::: userName=fish ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-24T17:19:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"137.64.59.218\",\"externalIp\":\"137.64.59.218\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:19:19.000Z\"} ::: clientIP=137.64.59.218 ::: serverIP=137.64.59.218 ::: userName=fish ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "MalwareOnline TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "137.64.59.218",
"serverIP": "94.213.124.111",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"137.64.59.218","externalIp":"137.64.59.218","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=137.64.59.218 ::: serverIP=137.64.59.218 ::: userName=fish ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"137.64.59.218","externalIp":"137.64.59.218","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=137.64.59.218 ::: serverIP=137.64.59.218 ::: userName=fish ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-24T17:19:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: MalwareOnline TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 137.64.59.218
serverIP: 94.213.124.111
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"233.92.236.132","externalIp":"233.92.236.132","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=233.92.236.132 ::: serverIP=233.92.236.132 ::: userName=bob ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-24T17:19:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"233.92.236.132\",\"externalIp\":\"233.92.236.132\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:19:19.000Z\"} ::: clientIP=233.92.236.132 ::: serverIP=233.92.236.132 ::: userName=bob ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "MalwareOnline TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "233.92.236.132",
"serverIP": "39.28.98.91",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"233.92.236.132","externalIp":"233.92.236.132","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=233.92.236.132 ::: serverIP=233.92.236.132 ::: userName=bob ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"233.92.236.132","externalIp":"233.92.236.132","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=233.92.236.132 ::: serverIP=233.92.236.132 ::: userName=bob ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-24T17:19:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: MalwareOnline TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 233.92.236.132
serverIP: 39.28.98.91
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"64.51.90.186","externalIp":"64.51.90.186","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=64.51.90.186 ::: serverIP=64.51.90.186 ::: userName=nighthawk ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-24T17:19:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"64.51.90.186\",\"externalIp\":\"64.51.90.186\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:19:19.000Z\"} ::: clientIP=64.51.90.186 ::: serverIP=64.51.90.186 ::: userName=nighthawk ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "MalwareOnline TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "64.51.90.186",
"serverIP": "173.181.144.158",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"64.51.90.186","externalIp":"64.51.90.186","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=64.51.90.186 ::: serverIP=64.51.90.186 ::: userName=nighthawk ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"64.51.90.186","externalIp":"64.51.90.186","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=64.51.90.186 ::: serverIP=64.51.90.186 ::: userName=nighthawk ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-24T17:19:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: MalwareOnline TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 64.51.90.186
serverIP: 173.181.144.158
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"221.81.14.72","externalIp":"185.10.7.236","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-24T17:15:19.000Z"} ::: clientIP=221.81.14.72 ::: serverIP=185.10.7.236 ::: userName=johndoe ::: created_at=2023-01-24T17:15:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:15:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-24T17:15:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"221.81.14.72\",\"externalIp\":\"185.10.7.236\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:15:19.000Z\"} ::: clientIP=221.81.14.72 ::: serverIP=185.10.7.236 ::: userName=johndoe ::: created_at=2023-01-24T17:15:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:15:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "MalwareOnline TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "221.81.14.72",
"serverIP": "185.10.7.236",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"221.81.14.72","externalIp":"185.10.7.236","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-24T17:15:19.000Z"} ::: clientIP=221.81.14.72 ::: serverIP=185.10.7.236 ::: userName=johndoe ::: created_at=2023-01-24T17:15:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:15:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"221.81.14.72","externalIp":"185.10.7.236","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-24T17:15:19.000Z"} ::: clientIP=221.81.14.72 ::: serverIP=185.10.7.236 ::: userName=johndoe ::: created_at=2023-01-24T17:15:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:15:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-24T17:15:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: MalwareOnline TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 221.81.14.72
serverIP: 185.10.7.236
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"9.39.158.30","externalIp":"138.244.151.140","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-24T17:15:19.000Z"} ::: clientIP=9.39.158.30 ::: serverIP=138.244.151.140 ::: userName=nighthawk ::: created_at=2023-01-24T17:15:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:15:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-24T17:15:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"9.39.158.30\",\"externalIp\":\"138.244.151.140\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:15:19.000Z\"} ::: clientIP=9.39.158.30 ::: serverIP=138.244.151.140 ::: userName=nighthawk ::: created_at=2023-01-24T17:15:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:15:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "MalwareOnline TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "9.39.158.30",
"serverIP": "138.244.151.140",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"9.39.158.30","externalIp":"138.244.151.140","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-24T17:15:19.000Z"} ::: clientIP=9.39.158.30 ::: serverIP=138.244.151.140 ::: userName=nighthawk ::: created_at=2023-01-24T17:15:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:15:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"9.39.158.30","externalIp":"138.244.151.140","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-24T17:15:19.000Z"} ::: clientIP=9.39.158.30 ::: serverIP=138.244.151.140 ::: userName=nighthawk ::: created_at=2023-01-24T17:15:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:15:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-24T17:15:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: MalwareOnline TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 9.39.158.30
serverIP: 138.244.151.140
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"135.68.136.174","externalIp":"118.181.137.240","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-24T17:38:19.000Z"} ::: clientIP=135.68.136.174 ::: serverIP=118.181.137.240 ::: userName=charlie ::: created_at=2023-01-24T17:38:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:38:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-24T17:38:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"135.68.136.174\",\"externalIp\":\"118.181.137.240\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:38:19.000Z\"} ::: clientIP=135.68.136.174 ::: serverIP=118.181.137.240 ::: userName=charlie ::: created_at=2023-01-24T17:38:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:38:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "MalwareOnline TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "135.68.136.174",
"serverIP": "118.181.137.240",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"135.68.136.174","externalIp":"118.181.137.240","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-24T17:38:19.000Z"} ::: clientIP=135.68.136.174 ::: serverIP=118.181.137.240 ::: userName=charlie ::: created_at=2023-01-24T17:38:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:38:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"135.68.136.174","externalIp":"118.181.137.240","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-24T17:38:19.000Z"} ::: clientIP=135.68.136.174 ::: serverIP=118.181.137.240 ::: userName=charlie ::: created_at=2023-01-24T17:38:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:38:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-24T17:38:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: MalwareOnline TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 135.68.136.174
serverIP: 118.181.137.240
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"225.195.89.215","externalIp":"66.196.88.178","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-24T17:38:19.000Z"} ::: clientIP=225.195.89.215 ::: serverIP=66.196.88.178 ::: userName=alice ::: created_at=2023-01-24T17:38:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:38:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-24T17:38:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"225.195.89.215\",\"externalIp\":\"66.196.88.178\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:38:19.000Z\"} ::: clientIP=225.195.89.215 ::: serverIP=66.196.88.178 ::: userName=alice ::: created_at=2023-01-24T17:38:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:38:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "MalwareOnline TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "225.195.89.215",
"serverIP": "66.196.88.178",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"225.195.89.215","externalIp":"66.196.88.178","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-24T17:38:19.000Z"} ::: clientIP=225.195.89.215 ::: serverIP=66.196.88.178 ::: userName=alice ::: created_at=2023-01-24T17:38:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:38:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"225.195.89.215","externalIp":"66.196.88.178","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-24T17:38:19.000Z"} ::: clientIP=225.195.89.215 ::: serverIP=66.196.88.178 ::: userName=alice ::: created_at=2023-01-24T17:38:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:38:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-24T17:38:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: MalwareOnline TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 225.195.89.215
serverIP: 66.196.88.178
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t211.233.68.90\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"211.233.68.90","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53154,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-11-22T01:07:37.721Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-11-22T01:07:39.142Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t211.233.68.90\\n\\tSource Port:\\t\\t53154\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"211.233.68.90\",\"IpPort\":\"53154\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":7640}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6577118386,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6577118386",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "211.233.68.90",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t211.233.68.90\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"211.233.68.90","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t211.233.68.90\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"211.233.68.90","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53154
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6577118386
streamName: microsoft-windows-security-auditing
clientIP: 211.233.68.90
userName: $ | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t199.133.92.118\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"199.133.92.118","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53154,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-11-22T01:07:37.721Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-11-22T01:07:39.142Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t199.133.92.118\\n\\tSource Port:\\t\\t53154\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"199.133.92.118\",\"IpPort\":\"53154\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":7640}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6577118386,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6577118386",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "199.133.92.118",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t199.133.92.118\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"199.133.92.118","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t199.133.92.118\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"199.133.92.118","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53154
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6577118386
streamName: microsoft-windows-security-auditing
clientIP: 199.133.92.118
userName: $ | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t10.205.75.31\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"10.205.75.31","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53154,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-11-22T01:07:37.721Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-11-22T01:07:39.142Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t10.205.75.31\\n\\tSource Port:\\t\\t53154\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"10.205.75.31\",\"IpPort\":\"53154\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":7640}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6577118386,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6577118386",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "10.205.75.31",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t10.205.75.31\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"10.205.75.31","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t10.205.75.31\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"10.205.75.31","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53154
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6577118386
streamName: microsoft-windows-security-auditing
clientIP: 10.205.75.31
userName: $ | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t245.202.146.170\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"245.202.146.170","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53154,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-11-22T01:07:37.721Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-11-22T01:07:39.142Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t245.202.146.170\\n\\tSource Port:\\t\\t53154\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"245.202.146.170\",\"IpPort\":\"53154\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":7640}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6577118386,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6577118386",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "245.202.146.170",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t245.202.146.170\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"245.202.146.170","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t245.202.146.170\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"245.202.146.170","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53154
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6577118386
streamName: microsoft-windows-security-auditing
clientIP: 245.202.146.170
userName: $ | Explain this syslog message |
<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=134.111.188.38 dpt=443 act=DENY msg=[{\\"method\\"\\:\\"login\\"\\,\\"params\\"\\:{\\"login\\"\\:\\"45JymPWP1De] duser="-" src=222.159.227.145 spt=64030 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=222.159.227.145 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"ProxyIP:106.75.139.49",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=134.111.188.38 dpt=443 act=DENY msg=[{\\\\\"method\\\\\"\\\\:\\\\\"login\\\\\"\\\\,\\\\\"params\\\\\"\\\\:{\\\\\"login\\\\\"\\\\:\\\\\"45JymPWP1De] duser=\"-\" src=222.159.227.145 spt=64030 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=222.159.227.145 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1672428500721 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 64030,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "222.159.227.145",
"serverIP": "134.111.188.38",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=134.111.188.38 dpt=443 act=DENY msg=[{\\"method\\"\\:\\"login\\"\\,\\"params\\"\\:{\\"login\\"\\:\\"45JymPWP1De] duser="-" src=222.159.227.145 spt=64030 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=222.159.227.145 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=134.111.188.38 dpt=443 act=DENY msg=[{\\"method\\"\\:\\"login\\"\\,\\"params\\"\\:{\\"login\\"\\:\\"45JymPWP1De] duser="-" src=222.159.227.145 spt=64030 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=222.159.227.145 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'ProxyIP:106.75.139.49', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1672428500721
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 64030
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 222.159.227.145
serverIP: 134.111.188.38
userName: - | Explain this syslog message |
<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=6.6.12.184 dpt=443 act=DENY msg=[{\\"method\\"\\:\\"login\\"\\,\\"params\\"\\:{\\"login\\"\\:\\"45JymPWP1De] duser="-" src=9.8.36.134 spt=64030 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=9.8.36.134 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"ProxyIP:106.75.139.49",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=6.6.12.184 dpt=443 act=DENY msg=[{\\\\\"method\\\\\"\\\\:\\\\\"login\\\\\"\\\\,\\\\\"params\\\\\"\\\\:{\\\\\"login\\\\\"\\\\:\\\\\"45JymPWP1De] duser=\"-\" src=9.8.36.134 spt=64030 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=9.8.36.134 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1672428500721 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 64030,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "9.8.36.134",
"serverIP": "6.6.12.184",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=6.6.12.184 dpt=443 act=DENY msg=[{\\"method\\"\\:\\"login\\"\\,\\"params\\"\\:{\\"login\\"\\:\\"45JymPWP1De] duser="-" src=9.8.36.134 spt=64030 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=9.8.36.134 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=6.6.12.184 dpt=443 act=DENY msg=[{\\"method\\"\\:\\"login\\"\\,\\"params\\"\\:{\\"login\\"\\:\\"45JymPWP1De] duser="-" src=9.8.36.134 spt=64030 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=9.8.36.134 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'ProxyIP:106.75.139.49', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1672428500721
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 64030
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 9.8.36.134
serverIP: 6.6.12.184
userName: - | Explain this syslog message |
<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=109.117.69.207 dpt=443 act=DENY msg=[{\\"method\\"\\:\\"login\\"\\,\\"params\\"\\:{\\"login\\"\\:\\"45JymPWP1De] duser="-" src=231.119.154.42 spt=64030 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=231.119.154.42 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"ProxyIP:106.75.139.49",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=109.117.69.207 dpt=443 act=DENY msg=[{\\\\\"method\\\\\"\\\\:\\\\\"login\\\\\"\\\\,\\\\\"params\\\\\"\\\\:{\\\\\"login\\\\\"\\\\:\\\\\"45JymPWP1De] duser=\"-\" src=231.119.154.42 spt=64030 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=231.119.154.42 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1672428500721 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 64030,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "231.119.154.42",
"serverIP": "109.117.69.207",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=109.117.69.207 dpt=443 act=DENY msg=[{\\"method\\"\\:\\"login\\"\\,\\"params\\"\\:{\\"login\\"\\:\\"45JymPWP1De] duser="-" src=231.119.154.42 spt=64030 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=231.119.154.42 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=109.117.69.207 dpt=443 act=DENY msg=[{\\"method\\"\\:\\"login\\"\\,\\"params\\"\\:{\\"login\\"\\:\\"45JymPWP1De] duser="-" src=231.119.154.42 spt=64030 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=231.119.154.42 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'ProxyIP:106.75.139.49', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1672428500721
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 64030
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 231.119.154.42
serverIP: 109.117.69.207
userName: - | Explain this syslog message |
<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=249.159.36.31 dpt=443 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"mining.subscribe\\"\\,\\"params\\"\\:\\[\\]}] duser="-" src=80.167.220.228 spt=64892 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=80.167.220.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"ProxyIP:106.75.139.49",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=249.159.36.31 dpt=443 act=DENY msg=[{\\\\\"id\\\\\"\\\\:1\\\\,\\\\\"method\\\\\"\\\\:\\\\\"mining.subscribe\\\\\"\\\\,\\\\\"params\\\\\"\\\\:\\\\[\\\\]}] duser=\"-\" src=80.167.220.228 spt=64892 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=80.167.220.228 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1672428501678 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 64892,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "80.167.220.228",
"serverIP": "249.159.36.31",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=249.159.36.31 dpt=443 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"mining.subscribe\\"\\,\\"params\\"\\:\\[\\]}] duser="-" src=80.167.220.228 spt=64892 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=80.167.220.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=249.159.36.31 dpt=443 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"mining.subscribe\\"\\,\\"params\\"\\:\\[\\]}] duser="-" src=80.167.220.228 spt=64892 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=80.167.220.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'ProxyIP:106.75.139.49', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1672428501678
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 64892
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 80.167.220.228
serverIP: 249.159.36.31
userName: - | Explain this syslog message |
<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=95.156.247.41 dpt=443 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"mining.subscribe\\"\\,\\"params\\"\\:\\[\\]}] duser="-" src=158.229.103.179 spt=64892 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=158.229.103.179 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"ProxyIP:106.75.139.49",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=95.156.247.41 dpt=443 act=DENY msg=[{\\\\\"id\\\\\"\\\\:1\\\\,\\\\\"method\\\\\"\\\\:\\\\\"mining.subscribe\\\\\"\\\\,\\\\\"params\\\\\"\\\\:\\\\[\\\\]}] duser=\"-\" src=158.229.103.179 spt=64892 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=158.229.103.179 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1672428501678 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 64892,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "158.229.103.179",
"serverIP": "95.156.247.41",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=95.156.247.41 dpt=443 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"mining.subscribe\\"\\,\\"params\\"\\:\\[\\]}] duser="-" src=158.229.103.179 spt=64892 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=158.229.103.179 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=95.156.247.41 dpt=443 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"mining.subscribe\\"\\,\\"params\\"\\:\\[\\]}] duser="-" src=158.229.103.179 spt=64892 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=158.229.103.179 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'ProxyIP:106.75.139.49', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1672428501678
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 64892
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 158.229.103.179
serverIP: 95.156.247.41
userName: - | Explain this syslog message |
<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=111.142.184.14 dpt=443 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"mining.subscribe\\"\\,\\"params\\"\\:\\[\\]}] duser="-" src=152.112.63.213 spt=64892 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=152.112.63.213 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"ProxyIP:106.75.139.49",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=111.142.184.14 dpt=443 act=DENY msg=[{\\\\\"id\\\\\"\\\\:1\\\\,\\\\\"method\\\\\"\\\\:\\\\\"mining.subscribe\\\\\"\\\\,\\\\\"params\\\\\"\\\\:\\\\[\\\\]}] duser=\"-\" src=152.112.63.213 spt=64892 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=152.112.63.213 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1672428501678 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 64892,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "152.112.63.213",
"serverIP": "111.142.184.14",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=111.142.184.14 dpt=443 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"mining.subscribe\\"\\,\\"params\\"\\:\\[\\]}] duser="-" src=152.112.63.213 spt=64892 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=152.112.63.213 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=111.142.184.14 dpt=443 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"mining.subscribe\\"\\,\\"params\\"\\:\\[\\]}] duser="-" src=152.112.63.213 spt=64892 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=152.112.63.213 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'ProxyIP:106.75.139.49', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1672428501678
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 64892
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 152.112.63.213
serverIP: 111.142.184.14
userName: - | Explain this syslog message |
<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=140.209.146.113 dpt=443 act=DENY msg=[{\\"params\\"\\: \\[\\"miner1\\"\\, \\"password\\"\\]\\, \\"id\\"\\: 2\\, \\"method\\"\\: \\"mining.authorize\\"}] duser="-" src=147.195.58.19 spt=10716 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=147.195.58.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"ProxyIP:106.75.139.49",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=140.209.146.113 dpt=443 act=DENY msg=[{\\\\\"params\\\\\"\\\\: \\\\[\\\\\"miner1\\\\\"\\\\, \\\\\"password\\\\\"\\\\]\\\\, \\\\\"id\\\\\"\\\\: 2\\\\, \\\\\"method\\\\\"\\\\: \\\\\"mining.authorize\\\\\"}] duser=\"-\" src=147.195.58.19 spt=10716 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=147.195.58.19 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1672428503246 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 10716,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "147.195.58.19",
"serverIP": "140.209.146.113",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=140.209.146.113 dpt=443 act=DENY msg=[{\\"params\\"\\: \\[\\"miner1\\"\\, \\"password\\"\\]\\, \\"id\\"\\: 2\\, \\"method\\"\\: \\"mining.authorize\\"}] duser="-" src=147.195.58.19 spt=10716 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=147.195.58.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=140.209.146.113 dpt=443 act=DENY msg=[{\\"params\\"\\: \\[\\"miner1\\"\\, \\"password\\"\\]\\, \\"id\\"\\: 2\\, \\"method\\"\\: \\"mining.authorize\\"}] duser="-" src=147.195.58.19 spt=10716 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=147.195.58.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'ProxyIP:106.75.139.49', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1672428503246
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 10716
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 147.195.58.19
serverIP: 140.209.146.113
userName: - | Explain this syslog message |
<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=243.132.42.202 dpt=443 act=DENY msg=[{\\"params\\"\\: \\[\\"miner1\\"\\, \\"password\\"\\]\\, \\"id\\"\\: 2\\, \\"method\\"\\: \\"mining.authorize\\"}] duser="-" src=237.199.108.52 spt=10716 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=237.199.108.52 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"ProxyIP:106.75.139.49",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=243.132.42.202 dpt=443 act=DENY msg=[{\\\\\"params\\\\\"\\\\: \\\\[\\\\\"miner1\\\\\"\\\\, \\\\\"password\\\\\"\\\\]\\\\, \\\\\"id\\\\\"\\\\: 2\\\\, \\\\\"method\\\\\"\\\\: \\\\\"mining.authorize\\\\\"}] duser=\"-\" src=237.199.108.52 spt=10716 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=237.199.108.52 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1672428503246 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 10716,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "237.199.108.52",
"serverIP": "243.132.42.202",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=243.132.42.202 dpt=443 act=DENY msg=[{\\"params\\"\\: \\[\\"miner1\\"\\, \\"password\\"\\]\\, \\"id\\"\\: 2\\, \\"method\\"\\: \\"mining.authorize\\"}] duser="-" src=237.199.108.52 spt=10716 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=237.199.108.52 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=243.132.42.202 dpt=443 act=DENY msg=[{\\"params\\"\\: \\[\\"miner1\\"\\, \\"password\\"\\]\\, \\"id\\"\\: 2\\, \\"method\\"\\: \\"mining.authorize\\"}] duser="-" src=237.199.108.52 spt=10716 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=237.199.108.52 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'ProxyIP:106.75.139.49', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1672428503246
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 10716
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 237.199.108.52
serverIP: 243.132.42.202
userName: - | Explain this syslog message |
<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=111.133.12.237 dpt=443 act=DENY msg=[{\\"params\\"\\: \\[\\"miner1\\"\\, \\"password\\"\\]\\, \\"id\\"\\: 2\\, \\"method\\"\\: \\"mining.authorize\\"}] duser="-" src=96.143.74.12 spt=10716 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=96.143.74.12 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"ProxyIP:106.75.139.49",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=111.133.12.237 dpt=443 act=DENY msg=[{\\\\\"params\\\\\"\\\\: \\\\[\\\\\"miner1\\\\\"\\\\, \\\\\"password\\\\\"\\\\]\\\\, \\\\\"id\\\\\"\\\\: 2\\\\, \\\\\"method\\\\\"\\\\: \\\\\"mining.authorize\\\\\"}] duser=\"-\" src=96.143.74.12 spt=10716 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=96.143.74.12 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1672428503246 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 10716,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "96.143.74.12",
"serverIP": "111.133.12.237",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=111.133.12.237 dpt=443 act=DENY msg=[{\\"params\\"\\: \\[\\"miner1\\"\\, \\"password\\"\\]\\, \\"id\\"\\: 2\\, \\"method\\"\\: \\"mining.authorize\\"}] duser="-" src=96.143.74.12 spt=10716 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=96.143.74.12 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=111.133.12.237 dpt=443 act=DENY msg=[{\\"params\\"\\: \\[\\"miner1\\"\\, \\"password\\"\\]\\, \\"id\\"\\: 2\\, \\"method\\"\\: \\"mining.authorize\\"}] duser="-" src=96.143.74.12 spt=10716 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=96.143.74.12 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'ProxyIP:106.75.139.49', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1672428503246
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 10716
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 96.143.74.12
serverIP: 111.133.12.237
userName: - | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t55.11.210.253\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"55.11.210.253","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}} | {
"action": "Logon",
"clientport": 63078,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-09-27T14:04:06.716Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-09-27T14:04:07.934Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t55.11.210.253\\n\\tSource Port:\\t\\t63078\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"55.11.210.253\",\"IpPort\":\"63078\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":18616}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6379284593,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6379284593",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "55.11.210.253",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t55.11.210.253\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"55.11.210.253","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t55.11.210.253\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"55.11.210.253","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 63078
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6379284593
streamName: microsoft-windows-security-auditing
clientIP: 55.11.210.253
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t80.28.210.226\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"80.28.210.226","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}} | {
"action": "Logon",
"clientport": 63078,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-09-27T14:04:06.716Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-09-27T14:04:07.934Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t80.28.210.226\\n\\tSource Port:\\t\\t63078\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"80.28.210.226\",\"IpPort\":\"63078\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":18616}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6379284593,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6379284593",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "80.28.210.226",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t80.28.210.226\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"80.28.210.226","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t80.28.210.226\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"80.28.210.226","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 63078
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6379284593
streamName: microsoft-windows-security-auditing
clientIP: 80.28.210.226
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t70.142.237.142\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"70.142.237.142","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}} | {
"action": "Logon",
"clientport": 63078,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-09-27T14:04:06.716Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-09-27T14:04:07.934Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t70.142.237.142\\n\\tSource Port:\\t\\t63078\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"70.142.237.142\",\"IpPort\":\"63078\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":18616}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6379284593,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6379284593",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "70.142.237.142",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t70.142.237.142\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"70.142.237.142","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t70.142.237.142\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"70.142.237.142","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 63078
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6379284593
streamName: microsoft-windows-security-auditing
clientIP: 70.142.237.142
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t72.191.7.155\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"72.191.7.155","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}} | {
"action": "Logon",
"clientport": 63078,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-09-27T14:04:06.716Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-09-27T14:04:07.934Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t72.191.7.155\\n\\tSource Port:\\t\\t63078\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"72.191.7.155\",\"IpPort\":\"63078\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":18616}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6379284593,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6379284593",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "72.191.7.155",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t72.191.7.155\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"72.191.7.155","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t72.191.7.155\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"72.191.7.155","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 63078
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6379284593
streamName: microsoft-windows-security-auditing
clientIP: 72.191.7.155
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542umbrella4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@umbrella.bank"],"senderIP":"173.74.104.122","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=173.74.104.122 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=173.74.104.122 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "jacquelinea@ccdfi.com",
"emailsendingserver": "40.107.237.126",
"emailsubject": "FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi",
"filehash": "<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>",
"filename": "from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatTime\":\"2023-10-26T16:13:32.000Z\",\"threat\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"campaignID\":null,\"threatType\":\"attumbrellament\"}],\"messageTime\":\"2023-10-26T16:14:39.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attumbrellament Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":190373,\"headerFrom\":\"Jacqueline Aguilar <jacquelinea@ccdfi.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"jacquelinea@ccdfi.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attumbrellaed\",\"sha256\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"md5\":\"44d0ab7332f1a029935bce372fb3c5d5\",\"filename\":\"employee jacquelinea d1067554-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61\",\"md5\":\"966b2674e9ff61c72ea242856ff4995c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"0e7da0b480ee472dd3e542umbrella4c6080a0841b17b1f0d593e13fb8132729565c9\",\"md5\":\"3484bb76ac447d3141c427edcd948261\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3\",\"md5\":\"8ceac3d79daf846749f6438b1fead7af\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"}],\"completelyRewritten\":false,\"id\":\"3f7bb408-8c1e-f280-ebe6-534d37fb93dc\",\"QID\":\"3tvagqj54f-1\",\"GUID\":\"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8\",\"sender\":\"jacquelinea@ccdfi.com\",\"recipient\":[\"pdixon@umbrella.bank\"],\"senderIP\":\"173.74.104.122\",\"messageID\":\"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>\"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=173.74.104.122 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=173.74.104.122 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-26T16:14:39.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "173.74.104.122"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542umbrella4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@umbrella.bank"],"senderIP":"173.74.104.122","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=173.74.104.122 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=173.74.104.122 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542umbrella4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@umbrella.bank"],"senderIP":"173.74.104.122","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=173.74.104.122 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=173.74.104.122 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: jacquelinea@ccdfi.com
emailsendingserver: 40.107.237.126
emailsubject: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi
filehash: <DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>
filename: from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-26T16:14:39.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 173.74.104.122 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"19.44.188.182","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=19.44.188.182 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=19.44.188.182 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "jacquelinea@ccdfi.com",
"emailsendingserver": "40.107.237.126",
"emailsubject": "FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi",
"filehash": "<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>",
"filename": "from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatTime\":\"2023-10-26T16:13:32.000Z\",\"threat\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2023-10-26T16:14:39.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":190373,\"headerFrom\":\"Jacqueline Aguilar <jacquelinea@ccdfi.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"jacquelinea@ccdfi.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attoscorped\",\"sha256\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"md5\":\"44d0ab7332f1a029935bce372fb3c5d5\",\"filename\":\"employee jacquelinea d1067554-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61\",\"md5\":\"966b2674e9ff61c72ea242856ff4995c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9\",\"md5\":\"3484bb76ac447d3141c427edcd948261\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3\",\"md5\":\"8ceac3d79daf846749f6438b1fead7af\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"}],\"completelyRewritten\":false,\"id\":\"3f7bb408-8c1e-f280-ebe6-534d37fb93dc\",\"QID\":\"3tvagqj54f-1\",\"GUID\":\"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8\",\"sender\":\"jacquelinea@ccdfi.com\",\"recipient\":[\"pdixon@oscorp.bank\"],\"senderIP\":\"19.44.188.182\",\"messageID\":\"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>\"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=19.44.188.182 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=19.44.188.182 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-26T16:14:39.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "19.44.188.182"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.