input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: fqdn=www.centervilleautorepairshop.us ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"201.227.25.53","externalIp":"242.176.105.109","categories":["Malware"],"tags":[],"destination":"www.centervilleautorepairshop.us","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-16T12:41:21.000Z"} ::: clientIP=201.227.25.53 ::: serverIP=242.176.105.109 ::: userName=janedoe ::: created_at=2023-01-16T12:41:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T12:41:21.000Z ::: serverHostname=www.centervilleautorepairshop.us ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-16T12:41:21.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.centervilleautorepairshop.us ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"201.227.25.53\",\"externalIp\":\"242.176.105.109\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.centervilleautorepairshop.us\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T12:41:21.000Z\"} ::: clientIP=201.227.25.53 ::: serverIP=242.176.105.109 ::: userName=janedoe ::: created_at=2023-01-16T12:41:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T12:41:21.000Z ::: serverHostname=www.centervilleautorepairshop.us ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.centervilleautorepairshop.us", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.centervilleautorepairshop.us", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "201.227.25.53", "serverIP": "242.176.105.109", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.centervilleautorepairshop.us ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"201.227.25.53","externalIp":"242.176.105.109","categories":["Malware"],"tags":[],"destination":"www.centervilleautorepairshop.us","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-16T12:41:21.000Z"} ::: clientIP=201.227.25.53 ::: serverIP=242.176.105.109 ::: userName=janedoe ::: created_at=2023-01-16T12:41:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T12:41:21.000Z ::: serverHostname=www.centervilleautorepairshop.us ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.centervilleautorepairshop.us ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"201.227.25.53","externalIp":"242.176.105.109","categories":["Malware"],"tags":[],"destination":"www.centervilleautorepairshop.us","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-16T12:41:21.000Z"} ::: clientIP=201.227.25.53 ::: serverIP=242.176.105.109 ::: userName=janedoe ::: created_at=2023-01-16T12:41:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T12:41:21.000Z ::: serverHostname=www.centervilleautorepairshop.us ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-16T12:41:21.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.centervilleautorepairshop.us messagetype: firewall_action severitycode: 2 fqdn: www.centervilleautorepairshop.us vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 201.227.25.53 serverIP: 242.176.105.109 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"93.97.44.184","externalIp":"234.35.117.54","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-02T13:11:07.000Z"} ::: clientIP=93.97.44.184 ::: serverIP=234.35.117.54 ::: userName=bob ::: created_at=2023-02-02T13:11:07.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T13:11:07.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-02T13:11:07.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"93.97.44.184\",\"externalIp\":\"234.35.117.54\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-02T13:11:07.000Z\"} ::: clientIP=93.97.44.184 ::: serverIP=234.35.117.54 ::: userName=bob ::: created_at=2023-02-02T13:11:07.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T13:11:07.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "PhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "93.97.44.184", "serverIP": "234.35.117.54", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"93.97.44.184","externalIp":"234.35.117.54","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-02T13:11:07.000Z"} ::: clientIP=93.97.44.184 ::: serverIP=234.35.117.54 ::: userName=bob ::: created_at=2023-02-02T13:11:07.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T13:11:07.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"93.97.44.184","externalIp":"234.35.117.54","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-02T13:11:07.000Z"} ::: clientIP=93.97.44.184 ::: serverIP=234.35.117.54 ::: userName=bob ::: created_at=2023-02-02T13:11:07.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T13:11:07.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-02T13:11:07.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: PhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 93.97.44.184 serverIP: 234.35.117.54 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"179.250.61.102","externalIp":"184.16.232.93","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-02-02T13:11:07.000Z"} ::: clientIP=179.250.61.102 ::: serverIP=184.16.232.93 ::: userName=charlie ::: created_at=2023-02-02T13:11:07.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T13:11:07.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-02T13:11:07.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"179.250.61.102\",\"externalIp\":\"184.16.232.93\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-02T13:11:07.000Z\"} ::: clientIP=179.250.61.102 ::: serverIP=184.16.232.93 ::: userName=charlie ::: created_at=2023-02-02T13:11:07.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T13:11:07.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "PhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "179.250.61.102", "serverIP": "184.16.232.93", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"179.250.61.102","externalIp":"184.16.232.93","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-02-02T13:11:07.000Z"} ::: clientIP=179.250.61.102 ::: serverIP=184.16.232.93 ::: userName=charlie ::: created_at=2023-02-02T13:11:07.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T13:11:07.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"179.250.61.102","externalIp":"184.16.232.93","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-02-02T13:11:07.000Z"} ::: clientIP=179.250.61.102 ::: serverIP=184.16.232.93 ::: userName=charlie ::: created_at=2023-02-02T13:11:07.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T13:11:07.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-02T13:11:07.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: PhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 179.250.61.102 serverIP: 184.16.232.93 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=clergymanwonderful.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"146.86.71.239","externalIp":"230.234.88.173","categories":["Malware"],"tags":[],"destination":"clergymanwonderful.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-12-06T15:45:18.000Z"} ::: clientIP=146.86.71.239 ::: serverIP=230.234.88.173 ::: userName=janedoe ::: created_at=2022-12-06T15:45:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-06T15:45:18.000Z ::: serverHostname=clergymanwonderful.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-06T15:45:18.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=clergymanwonderful.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"146.86.71.239\",\"externalIp\":\"230.234.88.173\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"clergymanwonderful.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-06T15:45:18.000Z\"} ::: clientIP=146.86.71.239 ::: serverIP=230.234.88.173 ::: userName=janedoe ::: created_at=2022-12-06T15:45:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-06T15:45:18.000Z ::: serverHostname=clergymanwonderful.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "clergymanwonderful.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "clergymanwonderful.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "146.86.71.239", "serverIP": "230.234.88.173", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clergymanwonderful.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"146.86.71.239","externalIp":"230.234.88.173","categories":["Malware"],"tags":[],"destination":"clergymanwonderful.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-12-06T15:45:18.000Z"} ::: clientIP=146.86.71.239 ::: serverIP=230.234.88.173 ::: userName=janedoe ::: created_at=2022-12-06T15:45:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-06T15:45:18.000Z ::: serverHostname=clergymanwonderful.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clergymanwonderful.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"146.86.71.239","externalIp":"230.234.88.173","categories":["Malware"],"tags":[],"destination":"clergymanwonderful.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-12-06T15:45:18.000Z"} ::: clientIP=146.86.71.239 ::: serverIP=230.234.88.173 ::: userName=janedoe ::: created_at=2022-12-06T15:45:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-06T15:45:18.000Z ::: serverHostname=clergymanwonderful.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-06T15:45:18.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: clergymanwonderful.com messagetype: firewall_action severitycode: 2 fqdn: clergymanwonderful.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 146.86.71.239 serverIP: 230.234.88.173 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=clergymanwonderful.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"168.244.46.148","externalIp":"185.72.80.84","categories":["Malware"],"tags":[],"destination":"clergymanwonderful.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-06T15:45:18.000Z"} ::: clientIP=168.244.46.148 ::: serverIP=185.72.80.84 ::: userName=fish ::: created_at=2022-12-06T15:45:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-06T15:45:18.000Z ::: serverHostname=clergymanwonderful.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-06T15:45:18.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=clergymanwonderful.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"168.244.46.148\",\"externalIp\":\"185.72.80.84\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"clergymanwonderful.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-06T15:45:18.000Z\"} ::: clientIP=168.244.46.148 ::: serverIP=185.72.80.84 ::: userName=fish ::: created_at=2022-12-06T15:45:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-06T15:45:18.000Z ::: serverHostname=clergymanwonderful.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "clergymanwonderful.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "clergymanwonderful.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "168.244.46.148", "serverIP": "185.72.80.84", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clergymanwonderful.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"168.244.46.148","externalIp":"185.72.80.84","categories":["Malware"],"tags":[],"destination":"clergymanwonderful.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-06T15:45:18.000Z"} ::: clientIP=168.244.46.148 ::: serverIP=185.72.80.84 ::: userName=fish ::: created_at=2022-12-06T15:45:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-06T15:45:18.000Z ::: serverHostname=clergymanwonderful.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clergymanwonderful.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"168.244.46.148","externalIp":"185.72.80.84","categories":["Malware"],"tags":[],"destination":"clergymanwonderful.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-06T15:45:18.000Z"} ::: clientIP=168.244.46.148 ::: serverIP=185.72.80.84 ::: userName=fish ::: created_at=2022-12-06T15:45:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-06T15:45:18.000Z ::: serverHostname=clergymanwonderful.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-06T15:45:18.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: clergymanwonderful.com messagetype: firewall_action severitycode: 2 fqdn: clergymanwonderful.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 168.244.46.148 serverIP: 185.72.80.84 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"131.75.250.48","externalIp":"8.215.178.236","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-24T17:28:19.000Z"} ::: clientIP=131.75.250.48 ::: serverIP=8.215.178.236 ::: userName=bob ::: created_at=2023-01-24T17:28:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:28:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-24T17:28:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"131.75.250.48\",\"externalIp\":\"8.215.178.236\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:28:19.000Z\"} ::: clientIP=131.75.250.48 ::: serverIP=8.215.178.236 ::: userName=bob ::: created_at=2023-01-24T17:28:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:28:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "MalwareOnline TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "131.75.250.48", "serverIP": "8.215.178.236", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"131.75.250.48","externalIp":"8.215.178.236","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-24T17:28:19.000Z"} ::: clientIP=131.75.250.48 ::: serverIP=8.215.178.236 ::: userName=bob ::: created_at=2023-01-24T17:28:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:28:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"131.75.250.48","externalIp":"8.215.178.236","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-24T17:28:19.000Z"} ::: clientIP=131.75.250.48 ::: serverIP=8.215.178.236 ::: userName=bob ::: created_at=2023-01-24T17:28:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:28:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-24T17:28:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: MalwareOnline TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 131.75.250.48 serverIP: 8.215.178.236 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"6.221.138.200","externalIp":"151.31.67.210","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-24T17:28:19.000Z"} ::: clientIP=6.221.138.200 ::: serverIP=151.31.67.210 ::: userName=janedoe ::: created_at=2023-01-24T17:28:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:28:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-24T17:28:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"6.221.138.200\",\"externalIp\":\"151.31.67.210\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:28:19.000Z\"} ::: clientIP=6.221.138.200 ::: serverIP=151.31.67.210 ::: userName=janedoe ::: created_at=2023-01-24T17:28:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:28:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "MalwareOnline TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "6.221.138.200", "serverIP": "151.31.67.210", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"6.221.138.200","externalIp":"151.31.67.210","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-24T17:28:19.000Z"} ::: clientIP=6.221.138.200 ::: serverIP=151.31.67.210 ::: userName=janedoe ::: created_at=2023-01-24T17:28:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:28:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"6.221.138.200","externalIp":"151.31.67.210","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-24T17:28:19.000Z"} ::: clientIP=6.221.138.200 ::: serverIP=151.31.67.210 ::: userName=janedoe ::: created_at=2023-01-24T17:28:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:28:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-24T17:28:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: MalwareOnline TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 6.221.138.200 serverIP: 151.31.67.210 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"119.10.80.23","externalIp":"119.10.80.23","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=119.10.80.23 ::: serverIP=119.10.80.23 ::: userName=bob ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-24T17:19:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"119.10.80.23\",\"externalIp\":\"119.10.80.23\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:19:19.000Z\"} ::: clientIP=119.10.80.23 ::: serverIP=119.10.80.23 ::: userName=bob ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "MalwareOnline TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "119.10.80.23", "serverIP": "90.79.60.233", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"119.10.80.23","externalIp":"119.10.80.23","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=119.10.80.23 ::: serverIP=119.10.80.23 ::: userName=bob ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"119.10.80.23","externalIp":"119.10.80.23","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=119.10.80.23 ::: serverIP=119.10.80.23 ::: userName=bob ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-24T17:19:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: MalwareOnline TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 119.10.80.23 serverIP: 90.79.60.233 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"137.64.59.218","externalIp":"137.64.59.218","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=137.64.59.218 ::: serverIP=137.64.59.218 ::: userName=fish ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-24T17:19:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"137.64.59.218\",\"externalIp\":\"137.64.59.218\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:19:19.000Z\"} ::: clientIP=137.64.59.218 ::: serverIP=137.64.59.218 ::: userName=fish ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "MalwareOnline TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "137.64.59.218", "serverIP": "94.213.124.111", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"137.64.59.218","externalIp":"137.64.59.218","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=137.64.59.218 ::: serverIP=137.64.59.218 ::: userName=fish ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"137.64.59.218","externalIp":"137.64.59.218","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=137.64.59.218 ::: serverIP=137.64.59.218 ::: userName=fish ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-24T17:19:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: MalwareOnline TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 137.64.59.218 serverIP: 94.213.124.111 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"233.92.236.132","externalIp":"233.92.236.132","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=233.92.236.132 ::: serverIP=233.92.236.132 ::: userName=bob ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-24T17:19:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"233.92.236.132\",\"externalIp\":\"233.92.236.132\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:19:19.000Z\"} ::: clientIP=233.92.236.132 ::: serverIP=233.92.236.132 ::: userName=bob ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "MalwareOnline TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "233.92.236.132", "serverIP": "39.28.98.91", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"233.92.236.132","externalIp":"233.92.236.132","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=233.92.236.132 ::: serverIP=233.92.236.132 ::: userName=bob ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"233.92.236.132","externalIp":"233.92.236.132","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=233.92.236.132 ::: serverIP=233.92.236.132 ::: userName=bob ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-24T17:19:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: MalwareOnline TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 233.92.236.132 serverIP: 39.28.98.91 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"64.51.90.186","externalIp":"64.51.90.186","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=64.51.90.186 ::: serverIP=64.51.90.186 ::: userName=nighthawk ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-24T17:19:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"64.51.90.186\",\"externalIp\":\"64.51.90.186\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:19:19.000Z\"} ::: clientIP=64.51.90.186 ::: serverIP=64.51.90.186 ::: userName=nighthawk ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "MalwareOnline TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "64.51.90.186", "serverIP": "173.181.144.158", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"64.51.90.186","externalIp":"64.51.90.186","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=64.51.90.186 ::: serverIP=64.51.90.186 ::: userName=nighthawk ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"64.51.90.186","externalIp":"64.51.90.186","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-24T17:19:19.000Z"} ::: clientIP=64.51.90.186 ::: serverIP=64.51.90.186 ::: userName=nighthawk ::: created_at=2023-01-24T17:19:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:19:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-24T17:19:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: MalwareOnline TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 64.51.90.186 serverIP: 173.181.144.158 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"221.81.14.72","externalIp":"185.10.7.236","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-24T17:15:19.000Z"} ::: clientIP=221.81.14.72 ::: serverIP=185.10.7.236 ::: userName=johndoe ::: created_at=2023-01-24T17:15:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:15:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-24T17:15:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"221.81.14.72\",\"externalIp\":\"185.10.7.236\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:15:19.000Z\"} ::: clientIP=221.81.14.72 ::: serverIP=185.10.7.236 ::: userName=johndoe ::: created_at=2023-01-24T17:15:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:15:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "MalwareOnline TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "221.81.14.72", "serverIP": "185.10.7.236", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"221.81.14.72","externalIp":"185.10.7.236","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-24T17:15:19.000Z"} ::: clientIP=221.81.14.72 ::: serverIP=185.10.7.236 ::: userName=johndoe ::: created_at=2023-01-24T17:15:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:15:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"221.81.14.72","externalIp":"185.10.7.236","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-24T17:15:19.000Z"} ::: clientIP=221.81.14.72 ::: serverIP=185.10.7.236 ::: userName=johndoe ::: created_at=2023-01-24T17:15:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:15:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-24T17:15:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: MalwareOnline TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 221.81.14.72 serverIP: 185.10.7.236 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"9.39.158.30","externalIp":"138.244.151.140","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-24T17:15:19.000Z"} ::: clientIP=9.39.158.30 ::: serverIP=138.244.151.140 ::: userName=nighthawk ::: created_at=2023-01-24T17:15:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:15:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-24T17:15:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"9.39.158.30\",\"externalIp\":\"138.244.151.140\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:15:19.000Z\"} ::: clientIP=9.39.158.30 ::: serverIP=138.244.151.140 ::: userName=nighthawk ::: created_at=2023-01-24T17:15:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:15:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "MalwareOnline TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "9.39.158.30", "serverIP": "138.244.151.140", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"9.39.158.30","externalIp":"138.244.151.140","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-24T17:15:19.000Z"} ::: clientIP=9.39.158.30 ::: serverIP=138.244.151.140 ::: userName=nighthawk ::: created_at=2023-01-24T17:15:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:15:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"9.39.158.30","externalIp":"138.244.151.140","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-24T17:15:19.000Z"} ::: clientIP=9.39.158.30 ::: serverIP=138.244.151.140 ::: userName=nighthawk ::: created_at=2023-01-24T17:15:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:15:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-24T17:15:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: MalwareOnline TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 9.39.158.30 serverIP: 138.244.151.140 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"135.68.136.174","externalIp":"118.181.137.240","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-24T17:38:19.000Z"} ::: clientIP=135.68.136.174 ::: serverIP=118.181.137.240 ::: userName=charlie ::: created_at=2023-01-24T17:38:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:38:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-24T17:38:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"135.68.136.174\",\"externalIp\":\"118.181.137.240\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:38:19.000Z\"} ::: clientIP=135.68.136.174 ::: serverIP=118.181.137.240 ::: userName=charlie ::: created_at=2023-01-24T17:38:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:38:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "MalwareOnline TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "135.68.136.174", "serverIP": "118.181.137.240", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"135.68.136.174","externalIp":"118.181.137.240","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-24T17:38:19.000Z"} ::: clientIP=135.68.136.174 ::: serverIP=118.181.137.240 ::: userName=charlie ::: created_at=2023-01-24T17:38:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:38:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"135.68.136.174","externalIp":"118.181.137.240","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-24T17:38:19.000Z"} ::: clientIP=135.68.136.174 ::: serverIP=118.181.137.240 ::: userName=charlie ::: created_at=2023-01-24T17:38:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:38:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-24T17:38:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: MalwareOnline TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 135.68.136.174 serverIP: 118.181.137.240 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"225.195.89.215","externalIp":"66.196.88.178","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-24T17:38:19.000Z"} ::: clientIP=225.195.89.215 ::: serverIP=66.196.88.178 ::: userName=alice ::: created_at=2023-01-24T17:38:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:38:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-24T17:38:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"225.195.89.215\",\"externalIp\":\"66.196.88.178\",\"categories\":[\"Malware\",\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-24T17:38:19.000Z\"} ::: clientIP=225.195.89.215 ::: serverIP=66.196.88.178 ::: userName=alice ::: created_at=2023-01-24T17:38:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:38:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "MalwareOnline TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "225.195.89.215", "serverIP": "66.196.88.178", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"225.195.89.215","externalIp":"66.196.88.178","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-24T17:38:19.000Z"} ::: clientIP=225.195.89.215 ::: serverIP=66.196.88.178 ::: userName=alice ::: created_at=2023-01-24T17:38:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:38:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"225.195.89.215","externalIp":"66.196.88.178","categories":["Malware","Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-24T17:38:19.000Z"} ::: clientIP=225.195.89.215 ::: serverIP=66.196.88.178 ::: userName=alice ::: created_at=2023-01-24T17:38:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareOnline TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-24T17:38:19.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-24T17:38:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: MalwareOnline TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 225.195.89.215 serverIP: 66.196.88.178 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t211.233.68.90\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"211.233.68.90","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}}
{ "action": "Logon", "clientport": 53154, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-11-22T01:07:37.721Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-11-22T01:07:39.142Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t211.233.68.90\\n\\tSource Port:\\t\\t53154\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"211.233.68.90\",\"IpPort\":\"53154\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":7640}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6577118386,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6577118386", "streamName": "microsoft-windows-security-auditing", "clientIP": "211.233.68.90", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t211.233.68.90\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"211.233.68.90","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t211.233.68.90\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"211.233.68.90","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53154 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6577118386 streamName: microsoft-windows-security-auditing clientIP: 211.233.68.90 userName: $
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t199.133.92.118\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"199.133.92.118","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}}
{ "action": "Logon", "clientport": 53154, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-11-22T01:07:37.721Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-11-22T01:07:39.142Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t199.133.92.118\\n\\tSource Port:\\t\\t53154\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"199.133.92.118\",\"IpPort\":\"53154\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":7640}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6577118386,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6577118386", "streamName": "microsoft-windows-security-auditing", "clientIP": "199.133.92.118", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t199.133.92.118\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"199.133.92.118","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t199.133.92.118\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"199.133.92.118","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53154 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6577118386 streamName: microsoft-windows-security-auditing clientIP: 199.133.92.118 userName: $
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t10.205.75.31\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"10.205.75.31","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}}
{ "action": "Logon", "clientport": 53154, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-11-22T01:07:37.721Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-11-22T01:07:39.142Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t10.205.75.31\\n\\tSource Port:\\t\\t53154\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"10.205.75.31\",\"IpPort\":\"53154\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":7640}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6577118386,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6577118386", "streamName": "microsoft-windows-security-auditing", "clientIP": "10.205.75.31", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t10.205.75.31\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"10.205.75.31","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t10.205.75.31\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"10.205.75.31","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53154 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6577118386 streamName: microsoft-windows-security-auditing clientIP: 10.205.75.31 userName: $
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t245.202.146.170\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"245.202.146.170","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}}
{ "action": "Logon", "clientport": 53154, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-11-22T01:07:37.721Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-11-22T01:07:39.142Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t245.202.146.170\\n\\tSource Port:\\t\\t53154\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"245.202.146.170\",\"IpPort\":\"53154\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":7640}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6577118386,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6577118386", "streamName": "microsoft-windows-security-auditing", "clientIP": "245.202.146.170", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t245.202.146.170\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"245.202.146.170","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-11-22T01:07:37.721Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-11-22T01:07:39.142Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t245.202.146.170\n\tSource Port:\t\t53154\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"245.202.146.170","IpPort":"53154","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":7640}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6577118386,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53154 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6577118386 streamName: microsoft-windows-security-auditing clientIP: 245.202.146.170 userName: $
Explain this syslog message
<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=134.111.188.38 dpt=443 act=DENY msg=[{\\"method\\"\\:\\"login\\"\\,\\"params\\"\\:{\\"login\\"\\:\\"45JymPWP1De] duser="-" src=222.159.227.145 spt=64030 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=222.159.227.145 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "ProxyIP:106.75.139.49", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=134.111.188.38 dpt=443 act=DENY msg=[{\\\\\"method\\\\\"\\\\:\\\\\"login\\\\\"\\\\,\\\\\"params\\\\\"\\\\:{\\\\\"login\\\\\"\\\\:\\\\\"45JymPWP1De] duser=\"-\" src=222.159.227.145 spt=64030 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=222.159.227.145 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1672428500721 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 64030, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "222.159.227.145", "serverIP": "134.111.188.38", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=134.111.188.38 dpt=443 act=DENY msg=[{\\"method\\"\\:\\"login\\"\\,\\"params\\"\\:{\\"login\\"\\:\\"45JymPWP1De] duser="-" src=222.159.227.145 spt=64030 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=222.159.227.145 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=134.111.188.38 dpt=443 act=DENY msg=[{\\"method\\"\\:\\"login\\"\\,\\"params\\"\\:{\\"login\\"\\:\\"45JymPWP1De] duser="-" src=222.159.227.145 spt=64030 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=222.159.227.145 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'ProxyIP:106.75.139.49', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1672428500721 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 64030 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 222.159.227.145 serverIP: 134.111.188.38 userName: -
Explain this syslog message
<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=6.6.12.184 dpt=443 act=DENY msg=[{\\"method\\"\\:\\"login\\"\\,\\"params\\"\\:{\\"login\\"\\:\\"45JymPWP1De] duser="-" src=9.8.36.134 spt=64030 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=9.8.36.134 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "ProxyIP:106.75.139.49", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=6.6.12.184 dpt=443 act=DENY msg=[{\\\\\"method\\\\\"\\\\:\\\\\"login\\\\\"\\\\,\\\\\"params\\\\\"\\\\:{\\\\\"login\\\\\"\\\\:\\\\\"45JymPWP1De] duser=\"-\" src=9.8.36.134 spt=64030 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=9.8.36.134 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1672428500721 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 64030, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "9.8.36.134", "serverIP": "6.6.12.184", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=6.6.12.184 dpt=443 act=DENY msg=[{\\"method\\"\\:\\"login\\"\\,\\"params\\"\\:{\\"login\\"\\:\\"45JymPWP1De] duser="-" src=9.8.36.134 spt=64030 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=9.8.36.134 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=6.6.12.184 dpt=443 act=DENY msg=[{\\"method\\"\\:\\"login\\"\\,\\"params\\"\\:{\\"login\\"\\:\\"45JymPWP1De] duser="-" src=9.8.36.134 spt=64030 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=9.8.36.134 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'ProxyIP:106.75.139.49', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1672428500721 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 64030 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 9.8.36.134 serverIP: 6.6.12.184 userName: -
Explain this syslog message
<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=109.117.69.207 dpt=443 act=DENY msg=[{\\"method\\"\\:\\"login\\"\\,\\"params\\"\\:{\\"login\\"\\:\\"45JymPWP1De] duser="-" src=231.119.154.42 spt=64030 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=231.119.154.42 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "ProxyIP:106.75.139.49", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=109.117.69.207 dpt=443 act=DENY msg=[{\\\\\"method\\\\\"\\\\:\\\\\"login\\\\\"\\\\,\\\\\"params\\\\\"\\\\:{\\\\\"login\\\\\"\\\\:\\\\\"45JymPWP1De] duser=\"-\" src=231.119.154.42 spt=64030 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=231.119.154.42 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1672428500721 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 64030, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "231.119.154.42", "serverIP": "109.117.69.207", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=109.117.69.207 dpt=443 act=DENY msg=[{\\"method\\"\\:\\"login\\"\\,\\"params\\"\\:{\\"login\\"\\:\\"45JymPWP1De] duser="-" src=231.119.154.42 spt=64030 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=231.119.154.42 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 30 13:28:20 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=109.117.69.207 dpt=443 act=DENY msg=[{\\"method\\"\\:\\"login\\"\\,\\"params\\"\\:{\\"login\\"\\:\\"45JymPWP1De] duser="-" src=231.119.154.42 spt=64030 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:20 rt=1672428500721 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481b6f1-dd6f1a1a cn2=64030 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=231.119.154.42 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'ProxyIP:106.75.139.49', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1672428500721 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 64030 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 231.119.154.42 serverIP: 109.117.69.207 userName: -
Explain this syslog message
<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=249.159.36.31 dpt=443 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"mining.subscribe\\"\\,\\"params\\"\\:\\[\\]}] duser="-" src=80.167.220.228 spt=64892 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=80.167.220.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "ProxyIP:106.75.139.49", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=249.159.36.31 dpt=443 act=DENY msg=[{\\\\\"id\\\\\"\\\\:1\\\\,\\\\\"method\\\\\"\\\\:\\\\\"mining.subscribe\\\\\"\\\\,\\\\\"params\\\\\"\\\\:\\\\[\\\\]}] duser=\"-\" src=80.167.220.228 spt=64892 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=80.167.220.228 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1672428501678 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 64892, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "80.167.220.228", "serverIP": "249.159.36.31", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=249.159.36.31 dpt=443 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"mining.subscribe\\"\\,\\"params\\"\\:\\[\\]}] duser="-" src=80.167.220.228 spt=64892 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=80.167.220.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=249.159.36.31 dpt=443 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"mining.subscribe\\"\\,\\"params\\"\\:\\[\\]}] duser="-" src=80.167.220.228 spt=64892 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=80.167.220.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'ProxyIP:106.75.139.49', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1672428501678 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 64892 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 80.167.220.228 serverIP: 249.159.36.31 userName: -
Explain this syslog message
<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=95.156.247.41 dpt=443 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"mining.subscribe\\"\\,\\"params\\"\\:\\[\\]}] duser="-" src=158.229.103.179 spt=64892 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=158.229.103.179 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "ProxyIP:106.75.139.49", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=95.156.247.41 dpt=443 act=DENY msg=[{\\\\\"id\\\\\"\\\\:1\\\\,\\\\\"method\\\\\"\\\\:\\\\\"mining.subscribe\\\\\"\\\\,\\\\\"params\\\\\"\\\\:\\\\[\\\\]}] duser=\"-\" src=158.229.103.179 spt=64892 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=158.229.103.179 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1672428501678 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 64892, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "158.229.103.179", "serverIP": "95.156.247.41", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=95.156.247.41 dpt=443 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"mining.subscribe\\"\\,\\"params\\"\\:\\[\\]}] duser="-" src=158.229.103.179 spt=64892 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=158.229.103.179 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=95.156.247.41 dpt=443 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"mining.subscribe\\"\\,\\"params\\"\\:\\[\\]}] duser="-" src=158.229.103.179 spt=64892 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=158.229.103.179 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'ProxyIP:106.75.139.49', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1672428501678 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 64892 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 158.229.103.179 serverIP: 95.156.247.41 userName: -
Explain this syslog message
<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=111.142.184.14 dpt=443 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"mining.subscribe\\"\\,\\"params\\"\\:\\[\\]}] duser="-" src=152.112.63.213 spt=64892 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=152.112.63.213 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "ProxyIP:106.75.139.49", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=111.142.184.14 dpt=443 act=DENY msg=[{\\\\\"id\\\\\"\\\\:1\\\\,\\\\\"method\\\\\"\\\\:\\\\\"mining.subscribe\\\\\"\\\\,\\\\\"params\\\\\"\\\\:\\\\[\\\\]}] duser=\"-\" src=152.112.63.213 spt=64892 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=152.112.63.213 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1672428501678 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 64892, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "152.112.63.213", "serverIP": "111.142.184.14", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=111.142.184.14 dpt=443 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"mining.subscribe\\"\\,\\"params\\"\\:\\[\\]}] duser="-" src=152.112.63.213 spt=64892 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=152.112.63.213 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 30 13:28:21 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=111.142.184.14 dpt=443 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"mining.subscribe\\"\\,\\"params\\"\\:\\[\\]}] duser="-" src=152.112.63.213 spt=64892 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:21 rt=1672428501678 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481baae-4c6622ae cn2=64892 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=152.112.63.213 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'ProxyIP:106.75.139.49', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1672428501678 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 64892 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 152.112.63.213 serverIP: 111.142.184.14 userName: -
Explain this syslog message
<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=140.209.146.113 dpt=443 act=DENY msg=[{\\"params\\"\\: \\[\\"miner1\\"\\, \\"password\\"\\]\\, \\"id\\"\\: 2\\, \\"method\\"\\: \\"mining.authorize\\"}] duser="-" src=147.195.58.19 spt=10716 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=147.195.58.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "ProxyIP:106.75.139.49", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=140.209.146.113 dpt=443 act=DENY msg=[{\\\\\"params\\\\\"\\\\: \\\\[\\\\\"miner1\\\\\"\\\\, \\\\\"password\\\\\"\\\\]\\\\, \\\\\"id\\\\\"\\\\: 2\\\\, \\\\\"method\\\\\"\\\\: \\\\\"mining.authorize\\\\\"}] duser=\"-\" src=147.195.58.19 spt=10716 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=147.195.58.19 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1672428503246 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 10716, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "147.195.58.19", "serverIP": "140.209.146.113", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=140.209.146.113 dpt=443 act=DENY msg=[{\\"params\\"\\: \\[\\"miner1\\"\\, \\"password\\"\\]\\, \\"id\\"\\: 2\\, \\"method\\"\\: \\"mining.authorize\\"}] duser="-" src=147.195.58.19 spt=10716 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=147.195.58.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=140.209.146.113 dpt=443 act=DENY msg=[{\\"params\\"\\: \\[\\"miner1\\"\\, \\"password\\"\\]\\, \\"id\\"\\: 2\\, \\"method\\"\\: \\"mining.authorize\\"}] duser="-" src=147.195.58.19 spt=10716 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=147.195.58.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'ProxyIP:106.75.139.49', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1672428503246 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 10716 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 147.195.58.19 serverIP: 140.209.146.113 userName: -
Explain this syslog message
<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=243.132.42.202 dpt=443 act=DENY msg=[{\\"params\\"\\: \\[\\"miner1\\"\\, \\"password\\"\\]\\, \\"id\\"\\: 2\\, \\"method\\"\\: \\"mining.authorize\\"}] duser="-" src=237.199.108.52 spt=10716 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=237.199.108.52 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "ProxyIP:106.75.139.49", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=243.132.42.202 dpt=443 act=DENY msg=[{\\\\\"params\\\\\"\\\\: \\\\[\\\\\"miner1\\\\\"\\\\, \\\\\"password\\\\\"\\\\]\\\\, \\\\\"id\\\\\"\\\\: 2\\\\, \\\\\"method\\\\\"\\\\: \\\\\"mining.authorize\\\\\"}] duser=\"-\" src=237.199.108.52 spt=10716 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=237.199.108.52 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1672428503246 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 10716, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "237.199.108.52", "serverIP": "243.132.42.202", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=243.132.42.202 dpt=443 act=DENY msg=[{\\"params\\"\\: \\[\\"miner1\\"\\, \\"password\\"\\]\\, \\"id\\"\\: 2\\, \\"method\\"\\: \\"mining.authorize\\"}] duser="-" src=237.199.108.52 spt=10716 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=237.199.108.52 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=243.132.42.202 dpt=443 act=DENY msg=[{\\"params\\"\\: \\[\\"miner1\\"\\, \\"password\\"\\]\\, \\"id\\"\\: 2\\, \\"method\\"\\: \\"mining.authorize\\"}] duser="-" src=237.199.108.52 spt=10716 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=237.199.108.52 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'ProxyIP:106.75.139.49', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1672428503246 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 10716 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 237.199.108.52 serverIP: 243.132.42.202 userName: -
Explain this syslog message
<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=111.133.12.237 dpt=443 act=DENY msg=[{\\"params\\"\\: \\[\\"miner1\\"\\, \\"password\\"\\]\\, \\"id\\"\\: 2\\, \\"method\\"\\: \\"mining.authorize\\"}] duser="-" src=96.143.74.12 spt=10716 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=96.143.74.12 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "ProxyIP:106.75.139.49", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=111.133.12.237 dpt=443 act=DENY msg=[{\\\\\"params\\\\\"\\\\: \\\\[\\\\\"miner1\\\\\"\\\\, \\\\\"password\\\\\"\\\\]\\\\, \\\\\"id\\\\\"\\\\: 2\\\\, \\\\\"method\\\\\"\\\\: \\\\\"mining.authorize\\\\\"}] duser=\"-\" src=96.143.74.12 spt=10716 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=96.143.74.12 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1672428503246 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 10716, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "96.143.74.12", "serverIP": "111.133.12.237", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=111.133.12.237 dpt=443 act=DENY msg=[{\\"params\\"\\: \\[\\"miner1\\"\\, \\"password\\"\\]\\, \\"id\\"\\: 2\\, \\"method\\"\\: \\"mining.authorize\\"}] duser="-" src=96.143.74.12 spt=10716 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=96.143.74.12 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 30 13:28:23 WAFirewall CEF:0|Barracuda|WAF|1101|118|INVALID_METHOD|1|cat=WF dst=111.133.12.237 dpt=443 act=DENY msg=[{\\"params\\"\\: \\[\\"miner1\\"\\, \\"password\\"\\]\\, \\"id\\"\\: 2\\, \\"method\\"\\: \\"mining.authorize\\"}] duser="-" src=96.143.74.12 spt=10716 requestMethod="-" app=TLSv1.3 requestContext="-" start=Dec 30 2022 13:28:23 rt=1672428503246 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=1856481c0ce-146b75e9 cn2=10716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=96.143.74.12 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'ProxyIP:106.75.139.49', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1672428503246 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 10716 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 96.143.74.12 serverIP: 111.133.12.237 userName: -
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t55.11.210.253\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"55.11.210.253","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}}
{ "action": "Logon", "clientport": 63078, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-09-27T14:04:06.716Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-09-27T14:04:07.934Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t55.11.210.253\\n\\tSource Port:\\t\\t63078\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"55.11.210.253\",\"IpPort\":\"63078\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":18616}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6379284593,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6379284593", "streamName": "microsoft-windows-security-auditing", "clientIP": "55.11.210.253", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t55.11.210.253\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"55.11.210.253","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t55.11.210.253\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"55.11.210.253","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 63078 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6379284593 streamName: microsoft-windows-security-auditing clientIP: 55.11.210.253 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t80.28.210.226\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"80.28.210.226","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}}
{ "action": "Logon", "clientport": 63078, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-09-27T14:04:06.716Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-09-27T14:04:07.934Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t80.28.210.226\\n\\tSource Port:\\t\\t63078\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"80.28.210.226\",\"IpPort\":\"63078\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":18616}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6379284593,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6379284593", "streamName": "microsoft-windows-security-auditing", "clientIP": "80.28.210.226", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t80.28.210.226\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"80.28.210.226","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t80.28.210.226\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"80.28.210.226","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 63078 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6379284593 streamName: microsoft-windows-security-auditing clientIP: 80.28.210.226 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t70.142.237.142\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"70.142.237.142","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}}
{ "action": "Logon", "clientport": 63078, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-09-27T14:04:06.716Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-09-27T14:04:07.934Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t70.142.237.142\\n\\tSource Port:\\t\\t63078\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"70.142.237.142\",\"IpPort\":\"63078\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":18616}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6379284593,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6379284593", "streamName": "microsoft-windows-security-auditing", "clientIP": "70.142.237.142", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t70.142.237.142\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"70.142.237.142","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t70.142.237.142\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"70.142.237.142","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 63078 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6379284593 streamName: microsoft-windows-security-auditing clientIP: 70.142.237.142 userName: janedoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t72.191.7.155\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"72.191.7.155","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}}
{ "action": "Logon", "clientport": 63078, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-09-27T14:04:06.716Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-09-27T14:04:07.934Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t72.191.7.155\\n\\tSource Port:\\t\\t63078\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"72.191.7.155\",\"IpPort\":\"63078\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":18616}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6379284593,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6379284593", "streamName": "microsoft-windows-security-auditing", "clientIP": "72.191.7.155", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t72.191.7.155\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"72.191.7.155","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-27T14:04:06.716Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-27T14:04:07.934Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t72.191.7.155\n\tSource Port:\t\t63078\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"72.191.7.155","IpPort":"63078","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":18616}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6379284593,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 63078 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6379284593 streamName: microsoft-windows-security-auditing clientIP: 72.191.7.155 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542umbrella4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@umbrella.bank"],"senderIP":"173.74.104.122","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=173.74.104.122 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=173.74.104.122 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "jacquelinea@ccdfi.com", "emailsendingserver": "40.107.237.126", "emailsubject": "FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi", "filehash": "<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>", "filename": "from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatTime\":\"2023-10-26T16:13:32.000Z\",\"threat\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"campaignID\":null,\"threatType\":\"attumbrellament\"}],\"messageTime\":\"2023-10-26T16:14:39.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attumbrellament Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":190373,\"headerFrom\":\"Jacqueline Aguilar <jacquelinea@ccdfi.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"jacquelinea@ccdfi.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attumbrellaed\",\"sha256\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"md5\":\"44d0ab7332f1a029935bce372fb3c5d5\",\"filename\":\"employee jacquelinea d1067554-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61\",\"md5\":\"966b2674e9ff61c72ea242856ff4995c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"0e7da0b480ee472dd3e542umbrella4c6080a0841b17b1f0d593e13fb8132729565c9\",\"md5\":\"3484bb76ac447d3141c427edcd948261\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3\",\"md5\":\"8ceac3d79daf846749f6438b1fead7af\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"}],\"completelyRewritten\":false,\"id\":\"3f7bb408-8c1e-f280-ebe6-534d37fb93dc\",\"QID\":\"3tvagqj54f-1\",\"GUID\":\"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8\",\"sender\":\"jacquelinea@ccdfi.com\",\"recipient\":[\"pdixon@umbrella.bank\"],\"senderIP\":\"173.74.104.122\",\"messageID\":\"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>\"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=173.74.104.122 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=173.74.104.122 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-26T16:14:39.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "173.74.104.122" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542umbrella4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@umbrella.bank"],"senderIP":"173.74.104.122","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=173.74.104.122 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=173.74.104.122 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542umbrella4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@umbrella.bank"],"senderIP":"173.74.104.122","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=173.74.104.122 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=173.74.104.122 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: jacquelinea@ccdfi.com emailsendingserver: 40.107.237.126 emailsubject: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi filehash: <DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> filename: from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-26T16:14:39.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 173.74.104.122
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"19.44.188.182","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=19.44.188.182 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=19.44.188.182 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "jacquelinea@ccdfi.com", "emailsendingserver": "40.107.237.126", "emailsubject": "FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi", "filehash": "<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>", "filename": "from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatTime\":\"2023-10-26T16:13:32.000Z\",\"threat\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2023-10-26T16:14:39.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":190373,\"headerFrom\":\"Jacqueline Aguilar <jacquelinea@ccdfi.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"jacquelinea@ccdfi.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attoscorped\",\"sha256\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"md5\":\"44d0ab7332f1a029935bce372fb3c5d5\",\"filename\":\"employee jacquelinea d1067554-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61\",\"md5\":\"966b2674e9ff61c72ea242856ff4995c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9\",\"md5\":\"3484bb76ac447d3141c427edcd948261\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3\",\"md5\":\"8ceac3d79daf846749f6438b1fead7af\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"}],\"completelyRewritten\":false,\"id\":\"3f7bb408-8c1e-f280-ebe6-534d37fb93dc\",\"QID\":\"3tvagqj54f-1\",\"GUID\":\"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8\",\"sender\":\"jacquelinea@ccdfi.com\",\"recipient\":[\"pdixon@oscorp.bank\"],\"senderIP\":\"19.44.188.182\",\"messageID\":\"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>\"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=19.44.188.182 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=19.44.188.182 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-26T16:14:39.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "19.44.188.182" }
Create a JSON artifact from the message