input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.448Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t71.171.38.65\n\tSource Port:\t\t53437\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"71.171.38.65","IpPort":"53437","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393909,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53437 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393909 streamName: microsoft-windows-security-auditing clientIP: 71.171.38.65 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.448Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t244.249.226.51\n\tSource Port:\t\t53437\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"244.249.226.51","IpPort":"53437","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393909,"task":"Logon"}}
{ "action": "Logon", "clientport": 53437, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.448Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.umbrella.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t244.249.226.51\\n\\tSource Port:\\t\\t53437\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"UWDC1.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.umbrella.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"244.249.226.51\",\"IpPort\":\"53437\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393909,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393909", "streamName": "microsoft-windows-security-auditing", "clientIP": "244.249.226.51", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.448Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t244.249.226.51\n\tSource Port:\t\t53437\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"244.249.226.51","IpPort":"53437","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393909,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.448Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t244.249.226.51\n\tSource Port:\t\t53437\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"244.249.226.51","IpPort":"53437","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393909,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53437 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393909 streamName: microsoft-windows-security-auditing clientIP: 244.249.226.51 userName: nighthawk
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t129.155.253.228\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC1.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"129.155.253.228","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}}
{ "action": "Logon", "clientport": 53440, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.514Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t129.155.253.228\\n\\tSource Port:\\t\\t53440\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"UWDC1.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"129.155.253.228\",\"IpPort\":\"53440\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393912,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393912", "streamName": "microsoft-windows-security-auditing", "clientIP": "129.155.253.228", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t129.155.253.228\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC1.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"129.155.253.228","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t129.155.253.228\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC1.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"129.155.253.228","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53440 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393912 streamName: microsoft-windows-security-auditing clientIP: 129.155.253.228 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t213.172.112.161\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC1.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"213.172.112.161","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}}
{ "action": "Logon", "clientport": 53440, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.514Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t213.172.112.161\\n\\tSource Port:\\t\\t53440\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"UWDC1.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"213.172.112.161\",\"IpPort\":\"53440\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393912,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393912", "streamName": "microsoft-windows-security-auditing", "clientIP": "213.172.112.161", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t213.172.112.161\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC1.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"213.172.112.161","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t213.172.112.161\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC1.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"213.172.112.161","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53440 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393912 streamName: microsoft-windows-security-auditing clientIP: 213.172.112.161 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t33.249.70.207\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"33.249.70.207","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}}
{ "action": "Logon", "clientport": 53441, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.519Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t33.249.70.207\\n\\tSource Port:\\t\\t53441\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC1.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"33.249.70.207\",\"IpPort\":\"53441\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393913,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393913", "streamName": "microsoft-windows-security-auditing", "clientIP": "33.249.70.207", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t33.249.70.207\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"33.249.70.207","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t33.249.70.207\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"33.249.70.207","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53441 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393913 streamName: microsoft-windows-security-auditing clientIP: 33.249.70.207 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t252.24.117.42\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"252.24.117.42","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}}
{ "action": "Logon", "clientport": 53441, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.519Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.umbrella.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t252.24.117.42\\n\\tSource Port:\\t\\t53441\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"UWDC1.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.umbrella.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"252.24.117.42\",\"IpPort\":\"53441\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393913,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393913", "streamName": "microsoft-windows-security-auditing", "clientIP": "252.24.117.42", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t252.24.117.42\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"252.24.117.42","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t252.24.117.42\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"252.24.117.42","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53441 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393913 streamName: microsoft-windows-security-auditing clientIP: 252.24.117.42 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.492Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t173.132.30.37\n\tSource Port:\t\t53438\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"173.132.30.37","IpPort":"53438","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393910,"task":"Logon"}}
{ "action": "Logon", "clientport": 53438, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.492Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t173.132.30.37\\n\\tSource Port:\\t\\t53438\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC1.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"173.132.30.37\",\"IpPort\":\"53438\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393910,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393910", "streamName": "microsoft-windows-security-auditing", "clientIP": "173.132.30.37", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.492Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t173.132.30.37\n\tSource Port:\t\t53438\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"173.132.30.37","IpPort":"53438","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393910,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.492Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t173.132.30.37\n\tSource Port:\t\t53438\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"173.132.30.37","IpPort":"53438","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393910,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53438 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393910 streamName: microsoft-windows-security-auditing clientIP: 173.132.30.37 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.492Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t245.123.148.220\n\tSource Port:\t\t53438\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"245.123.148.220","IpPort":"53438","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393910,"task":"Logon"}}
{ "action": "Logon", "clientport": 53438, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.492Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t245.123.148.220\\n\\tSource Port:\\t\\t53438\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC1.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"245.123.148.220\",\"IpPort\":\"53438\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393910,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393910", "streamName": "microsoft-windows-security-auditing", "clientIP": "245.123.148.220", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.492Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t245.123.148.220\n\tSource Port:\t\t53438\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"245.123.148.220","IpPort":"53438","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393910,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.492Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t245.123.148.220\n\tSource Port:\t\t53438\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"245.123.148.220","IpPort":"53438","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393910,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53438 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393910 streamName: microsoft-windows-security-auditing clientIP: 245.123.148.220 userName: janedoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.499Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t139.175.68.34\n\tSource Port:\t\t53439\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC1.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"139.175.68.34","IpPort":"53439","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393911,"task":"Logon"}}
{ "action": "Logon", "clientport": 53439, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.499Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t139.175.68.34\\n\\tSource Port:\\t\\t53439\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"UWDC1.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"139.175.68.34\",\"IpPort\":\"53439\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393911,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393911", "streamName": "microsoft-windows-security-auditing", "clientIP": "139.175.68.34", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.499Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t139.175.68.34\n\tSource Port:\t\t53439\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC1.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"139.175.68.34","IpPort":"53439","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393911,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.499Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t139.175.68.34\n\tSource Port:\t\t53439\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC1.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"139.175.68.34","IpPort":"53439","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393911,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53439 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393911 streamName: microsoft-windows-security-auditing clientIP: 139.175.68.34 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.499Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t223.35.184.117\n\tSource Port:\t\t53439\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"223.35.184.117","IpPort":"53439","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393911,"task":"Logon"}}
{ "action": "Logon", "clientport": 53439, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.499Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t223.35.184.117\\n\\tSource Port:\\t\\t53439\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC1.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"223.35.184.117\",\"IpPort\":\"53439\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393911,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393911", "streamName": "microsoft-windows-security-auditing", "clientIP": "223.35.184.117", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.499Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t223.35.184.117\n\tSource Port:\t\t53439\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"223.35.184.117","IpPort":"53439","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393911,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.499Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t223.35.184.117\n\tSource Port:\t\t53439\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"223.35.184.117","IpPort":"53439","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393911,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53439 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393911 streamName: microsoft-windows-security-auditing clientIP: 223.35.184.117 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.448Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t103.78.72.210\n\tSource Port:\t\t53437\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"103.78.72.210","IpPort":"53437","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393909,"task":"Logon"}}
{ "action": "Logon", "clientport": 53437, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.448Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t103.78.72.210\\n\\tSource Port:\\t\\t53437\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC1.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"103.78.72.210\",\"IpPort\":\"53437\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393909,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393909", "streamName": "microsoft-windows-security-auditing", "clientIP": "103.78.72.210", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.448Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t103.78.72.210\n\tSource Port:\t\t53437\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"103.78.72.210","IpPort":"53437","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393909,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.448Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t103.78.72.210\n\tSource Port:\t\t53437\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"103.78.72.210","IpPort":"53437","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393909,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53437 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393909 streamName: microsoft-windows-security-auditing clientIP: 103.78.72.210 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.448Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t91.195.63.54\n\tSource Port:\t\t53437\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"91.195.63.54","IpPort":"53437","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393909,"task":"Logon"}}
{ "action": "Logon", "clientport": 53437, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.448Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.umbrella.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t91.195.63.54\\n\\tSource Port:\\t\\t53437\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"UWDC1.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.umbrella.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"91.195.63.54\",\"IpPort\":\"53437\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393909,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393909", "streamName": "microsoft-windows-security-auditing", "clientIP": "91.195.63.54", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.448Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t91.195.63.54\n\tSource Port:\t\t53437\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"91.195.63.54","IpPort":"53437","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393909,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.448Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t91.195.63.54\n\tSource Port:\t\t53437\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"91.195.63.54","IpPort":"53437","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393909,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53437 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393909 streamName: microsoft-windows-security-auditing clientIP: 91.195.63.54 userName: janedoe
Explain this syslog message
<4>Jun 5 16:36:03 hq-postgres kernel: [333594.445577] [UFW BLOCK] IN=ens5 OUT= MAC=02:da:4a:4d:f8:d0:02:4b:94:bf:cd:44:08:00 SRC=154.112.68.122 DST=147.226.8.122 LEN=52 TOS=0x08 PREC=0x60 TTL=37 ID=16218 DF PROTO=TCP SPT=56744 DPT=5432 WINDOW=501 RES=0x00 ACK FIN URGP=0
{ "action": "block", "clientport": 56744, "facilitylabel": "kernel", "localhostname": "hq-postgres", "localstarttime": "Jun 5 16:36:03", "message": "<4>Jun 5 16:36:03 hq-postgres kernel: [333594.445577] [UFW BLOCK] IN=ens5 OUT= MAC=02:da:4a:4d:f8:d0:02:4b:94:bf:cd:44:08:00 SRC=154.112.68.122 DST=147.226.8.122 LEN=52 TOS=0x08 PREC=0x60 TTL=37 ID=16218 DF PROTO=TCP SPT=56744 DPT=5432 WINDOW=501 RES=0x00 ACK FIN URGP=0 ", "messagetype": "firewall_action", "priority": 4, "program": "kernel", "protocol": 6, "senderhost": "10.1.100.75", "sensitivity": "normal", "serverbytes": 52, "serverport": 5432, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "rfc3164", "ufw", "firewall_action" ], "streamName": "ufw", "clientIP": "154.112.68.122", "serverIP": "147.226.8.122" }
Create a JSON artifact from the message
<4>Jun 5 16:36:03 hq-postgres kernel: [333594.445577] [UFW BLOCK] IN=ens5 OUT= MAC=02:da:4a:4d:f8:d0:02:4b:94:bf:cd:44:08:00 SRC=154.112.68.122 DST=147.226.8.122 LEN=52 TOS=0x08 PREC=0x60 TTL=37 ID=16218 DF PROTO=TCP SPT=56744 DPT=5432 WINDOW=501 RES=0x00 ACK FIN URGP=0
Product: Uncomplicated Firewall (UFW) Vendor: linux
Identify this syslog message
<4>Jun 5 16:36:03 hq-postgres kernel: [333594.445577] [UFW BLOCK] IN=ens5 OUT= MAC=02:da:4a:4d:f8:d0:02:4b:94:bf:cd:44:08:00 SRC=154.112.68.122 DST=147.226.8.122 LEN=52 TOS=0x08 PREC=0x60 TTL=37 ID=16218 DF PROTO=TCP SPT=56744 DPT=5432 WINDOW=501 RES=0x00 ACK FIN URGP=0
This is a syslog message from a product called Uncomplicated Firewall (UFW) by linux. The following fields were extracted from the message: action: block clientport: 56744 facilitylabel: kernel localhostname: hq-postgres localstarttime: Jun 5 16:36:03 messagetype: firewall_action priority: 4 program: kernel protocol: 6 senderhost: 10.1.100.75 sensitivity: normal serverbytes: 52 serverport: 5432 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['rfc3164', 'ufw', 'firewall_action'] streamName: ufw clientIP: 154.112.68.122 serverIP: 147.226.8.122
Explain this syslog message
<4>Jun 5 16:36:03 hq-postgres kernel: [333594.445577] [UFW BLOCK] IN=ens5 OUT= MAC=02:da:4a:4d:f8:d0:02:4b:94:bf:cd:44:08:00 SRC=123.171.194.33 DST=106.90.13.26 LEN=52 TOS=0x08 PREC=0x60 TTL=37 ID=16218 DF PROTO=TCP SPT=56744 DPT=5432 WINDOW=501 RES=0x00 ACK FIN URGP=0
{ "action": "block", "clientport": 56744, "facilitylabel": "kernel", "localhostname": "hq-postgres", "localstarttime": "Jun 5 16:36:03", "message": "<4>Jun 5 16:36:03 hq-postgres kernel: [333594.445577] [UFW BLOCK] IN=ens5 OUT= MAC=02:da:4a:4d:f8:d0:02:4b:94:bf:cd:44:08:00 SRC=123.171.194.33 DST=106.90.13.26 LEN=52 TOS=0x08 PREC=0x60 TTL=37 ID=16218 DF PROTO=TCP SPT=56744 DPT=5432 WINDOW=501 RES=0x00 ACK FIN URGP=0 ", "messagetype": "firewall_action", "priority": 4, "program": "kernel", "protocol": 6, "senderhost": "10.1.100.75", "sensitivity": "normal", "serverbytes": 52, "serverport": 5432, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "rfc3164", "ufw", "firewall_action" ], "streamName": "ufw", "clientIP": "123.171.194.33", "serverIP": "106.90.13.26" }
Create a JSON artifact from the message
<4>Jun 5 16:36:03 hq-postgres kernel: [333594.445577] [UFW BLOCK] IN=ens5 OUT= MAC=02:da:4a:4d:f8:d0:02:4b:94:bf:cd:44:08:00 SRC=123.171.194.33 DST=106.90.13.26 LEN=52 TOS=0x08 PREC=0x60 TTL=37 ID=16218 DF PROTO=TCP SPT=56744 DPT=5432 WINDOW=501 RES=0x00 ACK FIN URGP=0
Product: Uncomplicated Firewall (UFW) Vendor: linux
Identify this syslog message
<4>Jun 5 16:36:03 hq-postgres kernel: [333594.445577] [UFW BLOCK] IN=ens5 OUT= MAC=02:da:4a:4d:f8:d0:02:4b:94:bf:cd:44:08:00 SRC=123.171.194.33 DST=106.90.13.26 LEN=52 TOS=0x08 PREC=0x60 TTL=37 ID=16218 DF PROTO=TCP SPT=56744 DPT=5432 WINDOW=501 RES=0x00 ACK FIN URGP=0
This is a syslog message from a product called Uncomplicated Firewall (UFW) by linux. The following fields were extracted from the message: action: block clientport: 56744 facilitylabel: kernel localhostname: hq-postgres localstarttime: Jun 5 16:36:03 messagetype: firewall_action priority: 4 program: kernel protocol: 6 senderhost: 10.1.100.75 sensitivity: normal serverbytes: 52 serverport: 5432 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['rfc3164', 'ufw', 'firewall_action'] streamName: ufw clientIP: 123.171.194.33 serverIP: 106.90.13.26
Explain this syslog message
WitFoo-Artifact ::: fqdn=sh0w-me-how.net ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"124.240.159.13","externalIp":"175.56.187.225","categories":["Malware","Not Actionable"],"tags":[],"destination":"sh0w-me-how.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-17T19:34:58.000Z"} ::: clientIP=124.240.159.13 ::: serverIP=175.56.187.225 ::: userName=bob ::: created_at=2023-05-17T19:34:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T19:34:58.000Z ::: serverHostname=sh0w-me-how.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "sh0w-me-how.net", "message": "WitFoo-Artifact ::: fqdn=sh0w-me-how.net ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"124.240.159.13\",\"externalIp\":\"175.56.187.225\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"sh0w-me-how.net\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-17T19:34:58.000Z\"} ::: clientIP=124.240.159.13 ::: serverIP=175.56.187.225 ::: userName=bob ::: created_at=2023-05-17T19:34:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T19:34:58.000Z ::: serverHostname=sh0w-me-how.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "sh0w-me-how.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-17T19:34:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareNot Actionable", "streamName": "OpenDNS Detection", "clientIP": "124.240.159.13", "serverIP": "175.56.187.225", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=sh0w-me-how.net ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"124.240.159.13","externalIp":"175.56.187.225","categories":["Malware","Not Actionable"],"tags":[],"destination":"sh0w-me-how.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-17T19:34:58.000Z"} ::: clientIP=124.240.159.13 ::: serverIP=175.56.187.225 ::: userName=bob ::: created_at=2023-05-17T19:34:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T19:34:58.000Z ::: serverHostname=sh0w-me-how.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=sh0w-me-how.net ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"124.240.159.13","externalIp":"175.56.187.225","categories":["Malware","Not Actionable"],"tags":[],"destination":"sh0w-me-how.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-17T19:34:58.000Z"} ::: clientIP=124.240.159.13 ::: serverIP=175.56.187.225 ::: userName=bob ::: created_at=2023-05-17T19:34:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T19:34:58.000Z ::: serverHostname=sh0w-me-how.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: sh0w-me-how.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: sh0w-me-how.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-17T19:34:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareNot Actionable streamName: OpenDNS Detection clientIP: 124.240.159.13 serverIP: 175.56.187.225 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=sh0w-me-how.net ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"175.43.218.107","externalIp":"111.100.23.124","categories":["Malware","Not Actionable"],"tags":[],"destination":"sh0w-me-how.net","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T19:34:58.000Z"} ::: clientIP=175.43.218.107 ::: serverIP=111.100.23.124 ::: userName=fish ::: created_at=2023-05-17T19:34:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T19:34:58.000Z ::: serverHostname=sh0w-me-how.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "sh0w-me-how.net", "message": "WitFoo-Artifact ::: fqdn=sh0w-me-how.net ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"175.43.218.107\",\"externalIp\":\"111.100.23.124\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"sh0w-me-how.net\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-17T19:34:58.000Z\"} ::: clientIP=175.43.218.107 ::: serverIP=111.100.23.124 ::: userName=fish ::: created_at=2023-05-17T19:34:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T19:34:58.000Z ::: serverHostname=sh0w-me-how.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "sh0w-me-how.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-17T19:34:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareNot Actionable", "streamName": "OpenDNS Detection", "clientIP": "175.43.218.107", "serverIP": "111.100.23.124", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=sh0w-me-how.net ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"175.43.218.107","externalIp":"111.100.23.124","categories":["Malware","Not Actionable"],"tags":[],"destination":"sh0w-me-how.net","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T19:34:58.000Z"} ::: clientIP=175.43.218.107 ::: serverIP=111.100.23.124 ::: userName=fish ::: created_at=2023-05-17T19:34:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T19:34:58.000Z ::: serverHostname=sh0w-me-how.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=sh0w-me-how.net ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"175.43.218.107","externalIp":"111.100.23.124","categories":["Malware","Not Actionable"],"tags":[],"destination":"sh0w-me-how.net","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T19:34:58.000Z"} ::: clientIP=175.43.218.107 ::: serverIP=111.100.23.124 ::: userName=fish ::: created_at=2023-05-17T19:34:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T19:34:58.000Z ::: serverHostname=sh0w-me-how.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: sh0w-me-how.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: sh0w-me-how.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-17T19:34:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareNot Actionable streamName: OpenDNS Detection clientIP: 175.43.218.107 serverIP: 111.100.23.124 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=static.noeyeon.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"38.100.14.54","externalIp":"152.62.24.116","categories":["Malware","Not Actionable"],"tags":[],"destination":"static.noeyeon.click","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-18T16:41:32.000Z"} ::: clientIP=38.100.14.54 ::: serverIP=152.62.24.116 ::: userName=janedoe ::: created_at=2023-05-18T16:41:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:41:32.000Z ::: serverHostname=static.noeyeon.click ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "static.noeyeon.click", "message": "WitFoo-Artifact ::: fqdn=static.noeyeon.click ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"38.100.14.54\",\"externalIp\":\"152.62.24.116\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"static.noeyeon.click\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T16:41:32.000Z\"} ::: clientIP=38.100.14.54 ::: serverIP=152.62.24.116 ::: userName=janedoe ::: created_at=2023-05-18T16:41:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:41:32.000Z ::: serverHostname=static.noeyeon.click ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "static.noeyeon.click", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-18T16:41:32.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareNot Actionable", "streamName": "OpenDNS Detection", "clientIP": "38.100.14.54", "serverIP": "152.62.24.116", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=static.noeyeon.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"38.100.14.54","externalIp":"152.62.24.116","categories":["Malware","Not Actionable"],"tags":[],"destination":"static.noeyeon.click","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-18T16:41:32.000Z"} ::: clientIP=38.100.14.54 ::: serverIP=152.62.24.116 ::: userName=janedoe ::: created_at=2023-05-18T16:41:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:41:32.000Z ::: serverHostname=static.noeyeon.click ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=static.noeyeon.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"38.100.14.54","externalIp":"152.62.24.116","categories":["Malware","Not Actionable"],"tags":[],"destination":"static.noeyeon.click","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-18T16:41:32.000Z"} ::: clientIP=38.100.14.54 ::: serverIP=152.62.24.116 ::: userName=janedoe ::: created_at=2023-05-18T16:41:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:41:32.000Z ::: serverHostname=static.noeyeon.click ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: static.noeyeon.click messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: static.noeyeon.click severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-18T16:41:32.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareNot Actionable streamName: OpenDNS Detection clientIP: 38.100.14.54 serverIP: 152.62.24.116 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=static.noeyeon.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"24.131.192.118","externalIp":"141.226.4.145","categories":["Malware","Not Actionable"],"tags":[],"destination":"static.noeyeon.click","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T16:41:32.000Z"} ::: clientIP=24.131.192.118 ::: serverIP=141.226.4.145 ::: userName=fish ::: created_at=2023-05-18T16:41:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:41:32.000Z ::: serverHostname=static.noeyeon.click ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "static.noeyeon.click", "message": "WitFoo-Artifact ::: fqdn=static.noeyeon.click ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"24.131.192.118\",\"externalIp\":\"141.226.4.145\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"static.noeyeon.click\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T16:41:32.000Z\"} ::: clientIP=24.131.192.118 ::: serverIP=141.226.4.145 ::: userName=fish ::: created_at=2023-05-18T16:41:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:41:32.000Z ::: serverHostname=static.noeyeon.click ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "static.noeyeon.click", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-18T16:41:32.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareNot Actionable", "streamName": "OpenDNS Detection", "clientIP": "24.131.192.118", "serverIP": "141.226.4.145", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=static.noeyeon.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"24.131.192.118","externalIp":"141.226.4.145","categories":["Malware","Not Actionable"],"tags":[],"destination":"static.noeyeon.click","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T16:41:32.000Z"} ::: clientIP=24.131.192.118 ::: serverIP=141.226.4.145 ::: userName=fish ::: created_at=2023-05-18T16:41:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:41:32.000Z ::: serverHostname=static.noeyeon.click ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=static.noeyeon.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"24.131.192.118","externalIp":"141.226.4.145","categories":["Malware","Not Actionable"],"tags":[],"destination":"static.noeyeon.click","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T16:41:32.000Z"} ::: clientIP=24.131.192.118 ::: serverIP=141.226.4.145 ::: userName=fish ::: created_at=2023-05-18T16:41:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:41:32.000Z ::: serverHostname=static.noeyeon.click ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: static.noeyeon.click messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: static.noeyeon.click severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-18T16:41:32.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareNot Actionable streamName: OpenDNS Detection clientIP: 24.131.192.118 serverIP: 141.226.4.145 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=static.noeyeon.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"70.174.167.255","externalIp":"208.189.139.97","categories":["Malware","Not Actionable"],"tags":[],"destination":"static.noeyeon.click","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-18T16:41:32.000Z"} ::: clientIP=70.174.167.255 ::: serverIP=208.189.139.97 ::: userName=janedoe ::: created_at=2023-05-18T16:41:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:41:32.000Z ::: serverHostname=static.noeyeon.click ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "static.noeyeon.click", "message": "WitFoo-Artifact ::: fqdn=static.noeyeon.click ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"70.174.167.255\",\"externalIp\":\"208.189.139.97\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"static.noeyeon.click\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T16:41:32.000Z\"} ::: clientIP=70.174.167.255 ::: serverIP=208.189.139.97 ::: userName=janedoe ::: created_at=2023-05-18T16:41:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:41:32.000Z ::: serverHostname=static.noeyeon.click ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "static.noeyeon.click", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-18T16:41:32.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareNot Actionable", "streamName": "OpenDNS Detection", "clientIP": "70.174.167.255", "serverIP": "208.189.139.97", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=static.noeyeon.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"70.174.167.255","externalIp":"208.189.139.97","categories":["Malware","Not Actionable"],"tags":[],"destination":"static.noeyeon.click","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-18T16:41:32.000Z"} ::: clientIP=70.174.167.255 ::: serverIP=208.189.139.97 ::: userName=janedoe ::: created_at=2023-05-18T16:41:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:41:32.000Z ::: serverHostname=static.noeyeon.click ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=static.noeyeon.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"70.174.167.255","externalIp":"208.189.139.97","categories":["Malware","Not Actionable"],"tags":[],"destination":"static.noeyeon.click","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-18T16:41:32.000Z"} ::: clientIP=70.174.167.255 ::: serverIP=208.189.139.97 ::: userName=janedoe ::: created_at=2023-05-18T16:41:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:41:32.000Z ::: serverHostname=static.noeyeon.click ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: static.noeyeon.click messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: static.noeyeon.click severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-18T16:41:32.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareNot Actionable streamName: OpenDNS Detection clientIP: 70.174.167.255 serverIP: 208.189.139.97 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=static.noeyeon.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"39.23.84.210","externalIp":"57.7.69.165","categories":["Malware","Not Actionable"],"tags":[],"destination":"static.noeyeon.click","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T16:41:32.000Z"} ::: clientIP=39.23.84.210 ::: serverIP=57.7.69.165 ::: userName=fish ::: created_at=2023-05-18T16:41:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:41:32.000Z ::: serverHostname=static.noeyeon.click ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "static.noeyeon.click", "message": "WitFoo-Artifact ::: fqdn=static.noeyeon.click ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"39.23.84.210\",\"externalIp\":\"57.7.69.165\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"static.noeyeon.click\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T16:41:32.000Z\"} ::: clientIP=39.23.84.210 ::: serverIP=57.7.69.165 ::: userName=fish ::: created_at=2023-05-18T16:41:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:41:32.000Z ::: serverHostname=static.noeyeon.click ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "static.noeyeon.click", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-18T16:41:32.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareNot Actionable", "streamName": "OpenDNS Detection", "clientIP": "39.23.84.210", "serverIP": "57.7.69.165", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=static.noeyeon.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"39.23.84.210","externalIp":"57.7.69.165","categories":["Malware","Not Actionable"],"tags":[],"destination":"static.noeyeon.click","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T16:41:32.000Z"} ::: clientIP=39.23.84.210 ::: serverIP=57.7.69.165 ::: userName=fish ::: created_at=2023-05-18T16:41:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:41:32.000Z ::: serverHostname=static.noeyeon.click ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=static.noeyeon.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"39.23.84.210","externalIp":"57.7.69.165","categories":["Malware","Not Actionable"],"tags":[],"destination":"static.noeyeon.click","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T16:41:32.000Z"} ::: clientIP=39.23.84.210 ::: serverIP=57.7.69.165 ::: userName=fish ::: created_at=2023-05-18T16:41:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:41:32.000Z ::: serverHostname=static.noeyeon.click ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: static.noeyeon.click messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: static.noeyeon.click severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-18T16:41:32.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareNot Actionable streamName: OpenDNS Detection clientIP: 39.23.84.210 serverIP: 57.7.69.165 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":1166883490,"originType":"AD Users","internalIp":"165.55.98.16","externalIp":"70.33.157.196","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-29T15:04:14.000Z"} ::: clientIP=165.55.98.16 ::: serverIP=70.33.157.196 ::: userName=janedoe ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "rum.browser-intake-foxbusiness.com", "message": "WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={\"originId\":1166883490,\"originType\":\"AD Users\",\"internalIp\":\"165.55.98.16\",\"externalIp\":\"70.33.157.196\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"rum.browser-intake-foxbusiness.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-29T15:04:14.000Z\"} ::: clientIP=165.55.98.16 ::: serverIP=70.33.157.196 ::: userName=janedoe ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "rum.browser-intake-foxbusiness.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-29T15:04:14.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "165.55.98.16", "serverIP": "70.33.157.196", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":1166883490,"originType":"AD Users","internalIp":"165.55.98.16","externalIp":"70.33.157.196","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-29T15:04:14.000Z"} ::: clientIP=165.55.98.16 ::: serverIP=70.33.157.196 ::: userName=janedoe ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":1166883490,"originType":"AD Users","internalIp":"165.55.98.16","externalIp":"70.33.157.196","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-29T15:04:14.000Z"} ::: clientIP=165.55.98.16 ::: serverIP=70.33.157.196 ::: userName=janedoe ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: rum.browser-intake-foxbusiness.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: rum.browser-intake-foxbusiness.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-29T15:04:14.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 165.55.98.16 serverIP: 70.33.157.196 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":1166883490,"originType":"AD Users","internalIp":"28.130.148.251","externalIp":"76.27.125.175","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-29T15:04:14.000Z"} ::: clientIP=28.130.148.251 ::: serverIP=76.27.125.175 ::: userName=nighthawk ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "rum.browser-intake-foxbusiness.com", "message": "WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={\"originId\":1166883490,\"originType\":\"AD Users\",\"internalIp\":\"28.130.148.251\",\"externalIp\":\"76.27.125.175\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"rum.browser-intake-foxbusiness.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-29T15:04:14.000Z\"} ::: clientIP=28.130.148.251 ::: serverIP=76.27.125.175 ::: userName=nighthawk ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "rum.browser-intake-foxbusiness.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-29T15:04:14.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "28.130.148.251", "serverIP": "76.27.125.175", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":1166883490,"originType":"AD Users","internalIp":"28.130.148.251","externalIp":"76.27.125.175","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-29T15:04:14.000Z"} ::: clientIP=28.130.148.251 ::: serverIP=76.27.125.175 ::: userName=nighthawk ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":1166883490,"originType":"AD Users","internalIp":"28.130.148.251","externalIp":"76.27.125.175","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-29T15:04:14.000Z"} ::: clientIP=28.130.148.251 ::: serverIP=76.27.125.175 ::: userName=nighthawk ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: rum.browser-intake-foxbusiness.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: rum.browser-intake-foxbusiness.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-29T15:04:14.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 28.130.148.251 serverIP: 76.27.125.175 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":1166883490,"originType":"AD Users","internalIp":"65.171.155.164","externalIp":"182.110.148.51","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-29T15:04:14.000Z"} ::: clientIP=65.171.155.164 ::: serverIP=182.110.148.51 ::: userName=bob ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "rum.browser-intake-foxbusiness.com", "message": "WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={\"originId\":1166883490,\"originType\":\"AD Users\",\"internalIp\":\"65.171.155.164\",\"externalIp\":\"182.110.148.51\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"rum.browser-intake-foxbusiness.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-29T15:04:14.000Z\"} ::: clientIP=65.171.155.164 ::: serverIP=182.110.148.51 ::: userName=bob ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "rum.browser-intake-foxbusiness.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-29T15:04:14.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "65.171.155.164", "serverIP": "182.110.148.51", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":1166883490,"originType":"AD Users","internalIp":"65.171.155.164","externalIp":"182.110.148.51","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-29T15:04:14.000Z"} ::: clientIP=65.171.155.164 ::: serverIP=182.110.148.51 ::: userName=bob ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":1166883490,"originType":"AD Users","internalIp":"65.171.155.164","externalIp":"182.110.148.51","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-29T15:04:14.000Z"} ::: clientIP=65.171.155.164 ::: serverIP=182.110.148.51 ::: userName=bob ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: rum.browser-intake-foxbusiness.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: rum.browser-intake-foxbusiness.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-29T15:04:14.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 65.171.155.164 serverIP: 182.110.148.51 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":1166883490,"originType":"AD Users","internalIp":"245.76.22.245","externalIp":"166.212.113.12","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-29T15:04:14.000Z"} ::: clientIP=245.76.22.245 ::: serverIP=166.212.113.12 ::: userName=johndoe ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "rum.browser-intake-foxbusiness.com", "message": "WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={\"originId\":1166883490,\"originType\":\"AD Users\",\"internalIp\":\"245.76.22.245\",\"externalIp\":\"166.212.113.12\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"rum.browser-intake-foxbusiness.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-29T15:04:14.000Z\"} ::: clientIP=245.76.22.245 ::: serverIP=166.212.113.12 ::: userName=johndoe ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "rum.browser-intake-foxbusiness.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-29T15:04:14.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "245.76.22.245", "serverIP": "166.212.113.12", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":1166883490,"originType":"AD Users","internalIp":"245.76.22.245","externalIp":"166.212.113.12","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-29T15:04:14.000Z"} ::: clientIP=245.76.22.245 ::: serverIP=166.212.113.12 ::: userName=johndoe ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":1166883490,"originType":"AD Users","internalIp":"245.76.22.245","externalIp":"166.212.113.12","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-29T15:04:14.000Z"} ::: clientIP=245.76.22.245 ::: serverIP=166.212.113.12 ::: userName=johndoe ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: rum.browser-intake-foxbusiness.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: rum.browser-intake-foxbusiness.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-29T15:04:14.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 245.76.22.245 serverIP: 166.212.113.12 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":1166883490,"originType":"AD Users","internalIp":"87.185.226.141","externalIp":"68.176.158.114","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-29T15:04:14.000Z"} ::: clientIP=87.185.226.141 ::: serverIP=68.176.158.114 ::: userName=charlie ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "rum.browser-intake-foxbusiness.com", "message": "WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={\"originId\":1166883490,\"originType\":\"AD Users\",\"internalIp\":\"87.185.226.141\",\"externalIp\":\"68.176.158.114\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"rum.browser-intake-foxbusiness.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-29T15:04:14.000Z\"} ::: clientIP=87.185.226.141 ::: serverIP=68.176.158.114 ::: userName=charlie ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "rum.browser-intake-foxbusiness.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-29T15:04:14.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "87.185.226.141", "serverIP": "68.176.158.114", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":1166883490,"originType":"AD Users","internalIp":"87.185.226.141","externalIp":"68.176.158.114","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-29T15:04:14.000Z"} ::: clientIP=87.185.226.141 ::: serverIP=68.176.158.114 ::: userName=charlie ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":1166883490,"originType":"AD Users","internalIp":"87.185.226.141","externalIp":"68.176.158.114","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-29T15:04:14.000Z"} ::: clientIP=87.185.226.141 ::: serverIP=68.176.158.114 ::: userName=charlie ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: rum.browser-intake-foxbusiness.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: rum.browser-intake-foxbusiness.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-29T15:04:14.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 87.185.226.141 serverIP: 68.176.158.114 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":1166883490,"originType":"AD Users","internalIp":"149.150.115.126","externalIp":"91.215.238.233","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-29T15:04:14.000Z"} ::: clientIP=149.150.115.126 ::: serverIP=91.215.238.233 ::: userName=fish ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "rum.browser-intake-foxbusiness.com", "message": "WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={\"originId\":1166883490,\"originType\":\"AD Users\",\"internalIp\":\"149.150.115.126\",\"externalIp\":\"91.215.238.233\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"rum.browser-intake-foxbusiness.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-29T15:04:14.000Z\"} ::: clientIP=149.150.115.126 ::: serverIP=91.215.238.233 ::: userName=fish ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "rum.browser-intake-foxbusiness.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-29T15:04:14.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "149.150.115.126", "serverIP": "91.215.238.233", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":1166883490,"originType":"AD Users","internalIp":"149.150.115.126","externalIp":"91.215.238.233","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-29T15:04:14.000Z"} ::: clientIP=149.150.115.126 ::: serverIP=91.215.238.233 ::: userName=fish ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":1166883490,"originType":"AD Users","internalIp":"149.150.115.126","externalIp":"91.215.238.233","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-29T15:04:14.000Z"} ::: clientIP=149.150.115.126 ::: serverIP=91.215.238.233 ::: userName=fish ::: created_at=2023-03-29T15:04:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T15:04:14.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: rum.browser-intake-foxbusiness.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: rum.browser-intake-foxbusiness.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-29T15:04:14.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 149.150.115.126 serverIP: 91.215.238.233 userName: fish
Explain this syslog message
<185>Feb 4 13:43:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=30.145.1.226 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=133.240.145.10 spt=39127 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 04 2023 13:43:24 rt=1675539804580 request=/ requestClientApplication="Mozilla/5.0 (compatible; InternetMeasurement/1.0; +https://internet-measurement.com/)" dvchost=WAFirewall externalId=1861df471a4-6c39f6cc cn2=39127 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=133.240.145.10 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:87.236.176.114", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 4 13:43:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=30.145.1.226 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=133.240.145.10 spt=39127 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 04 2023 13:43:24 rt=1675539804580 request=/ requestClientApplication=\"Mozilla/5.0 (compatible; InternetMeasurement/1.0; +https://internet-measurement.com/)\" dvchost=WAFirewall externalId=1861df471a4-6c39f6cc cn2=39127 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=133.240.145.10 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675539804580 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 39127, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "133.240.145.10", "serverIP": "30.145.1.226", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 4 13:43:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=30.145.1.226 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=133.240.145.10 spt=39127 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 04 2023 13:43:24 rt=1675539804580 request=/ requestClientApplication="Mozilla/5.0 (compatible; InternetMeasurement/1.0; +https://internet-measurement.com/)" dvchost=WAFirewall externalId=1861df471a4-6c39f6cc cn2=39127 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=133.240.145.10 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 4 13:43:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=30.145.1.226 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=133.240.145.10 spt=39127 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 04 2023 13:43:24 rt=1675539804580 request=/ requestClientApplication="Mozilla/5.0 (compatible; InternetMeasurement/1.0; +https://internet-measurement.com/)" dvchost=WAFirewall externalId=1861df471a4-6c39f6cc cn2=39127 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=133.240.145.10 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:87.236.176.114', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675539804580 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 39127 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 133.240.145.10 serverIP: 30.145.1.226 userName: -
Explain this syslog message
<185>Feb 4 13:43:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=82.7.24.98 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=226.106.75.224 spt=39127 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 04 2023 13:43:24 rt=1675539804580 request=/ requestClientApplication="Mozilla/5.0 (compatible; InternetMeasurement/1.0; +https://internet-measurement.com/)" dvchost=WAFirewall externalId=1861df471a4-6c39f6cc cn2=39127 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=226.106.75.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:87.236.176.114", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 4 13:43:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=82.7.24.98 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=226.106.75.224 spt=39127 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 04 2023 13:43:24 rt=1675539804580 request=/ requestClientApplication=\"Mozilla/5.0 (compatible; InternetMeasurement/1.0; +https://internet-measurement.com/)\" dvchost=WAFirewall externalId=1861df471a4-6c39f6cc cn2=39127 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=226.106.75.224 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675539804580 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 39127, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "226.106.75.224", "serverIP": "82.7.24.98", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 4 13:43:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=82.7.24.98 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=226.106.75.224 spt=39127 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 04 2023 13:43:24 rt=1675539804580 request=/ requestClientApplication="Mozilla/5.0 (compatible; InternetMeasurement/1.0; +https://internet-measurement.com/)" dvchost=WAFirewall externalId=1861df471a4-6c39f6cc cn2=39127 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=226.106.75.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 4 13:43:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=82.7.24.98 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=226.106.75.224 spt=39127 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 04 2023 13:43:24 rt=1675539804580 request=/ requestClientApplication="Mozilla/5.0 (compatible; InternetMeasurement/1.0; +https://internet-measurement.com/)" dvchost=WAFirewall externalId=1861df471a4-6c39f6cc cn2=39127 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=226.106.75.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:87.236.176.114', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675539804580 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 39127 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 226.106.75.224 serverIP: 82.7.24.98 userName: -
Explain this syslog message
<185>Feb 4 13:43:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=53.74.123.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=104.152.253.29 spt=39127 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 04 2023 13:43:24 rt=1675539804580 request=/ requestClientApplication="Mozilla/5.0 (compatible; InternetMeasurement/1.0; +https://internet-measurement.com/)" dvchost=WAFirewall externalId=1861df471a4-6c39f6cc cn2=39127 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=104.152.253.29 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:87.236.176.114", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 4 13:43:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=53.74.123.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=104.152.253.29 spt=39127 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 04 2023 13:43:24 rt=1675539804580 request=/ requestClientApplication=\"Mozilla/5.0 (compatible; InternetMeasurement/1.0; +https://internet-measurement.com/)\" dvchost=WAFirewall externalId=1861df471a4-6c39f6cc cn2=39127 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=104.152.253.29 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675539804580 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 39127, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "104.152.253.29", "serverIP": "53.74.123.33", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 4 13:43:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=53.74.123.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=104.152.253.29 spt=39127 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 04 2023 13:43:24 rt=1675539804580 request=/ requestClientApplication="Mozilla/5.0 (compatible; InternetMeasurement/1.0; +https://internet-measurement.com/)" dvchost=WAFirewall externalId=1861df471a4-6c39f6cc cn2=39127 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=104.152.253.29 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 4 13:43:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=53.74.123.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=104.152.253.29 spt=39127 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 04 2023 13:43:24 rt=1675539804580 request=/ requestClientApplication="Mozilla/5.0 (compatible; InternetMeasurement/1.0; +https://internet-measurement.com/)" dvchost=WAFirewall externalId=1861df471a4-6c39f6cc cn2=39127 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=104.152.253.29 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:87.236.176.114', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675539804580 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 39127 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 104.152.253.29 serverIP: 53.74.123.33 userName: -
Explain this syslog message
<185>Oct 3 09:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.23.166.100 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=13.150.40.227 spt=33121 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 03 2023 09:13:19 rt=1696342399381 request=/LoginReset.jsp requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.198 Safari/537.36" dvchost=WAFirewall externalId=18af5e2d876-79ba7094 cn2=33121 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=13.150.40.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 33121, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/LoginReset.jsp", "localhostname": "WAFirewall", "localstarttime": "1696342399381 ", "message": "<185>Oct 3 09:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.23.166.100 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=13.150.40.227 spt=33121 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 03 2023 09:13:19 rt=1696342399381 request=/LoginReset.jsp requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.198 Safari/537.36\" dvchost=WAFirewall externalId=18af5e2d876-79ba7094 cn2=33121 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=13.150.40.227 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:144.217.125.144" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "13.150.40.227", "serverIP": "239.23.166.100", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 3 09:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.23.166.100 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=13.150.40.227 spt=33121 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 03 2023 09:13:19 rt=1696342399381 request=/LoginReset.jsp requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.198 Safari/537.36" dvchost=WAFirewall externalId=18af5e2d876-79ba7094 cn2=33121 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=13.150.40.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 3 09:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.23.166.100 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=13.150.40.227 spt=33121 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 03 2023 09:13:19 rt=1696342399381 request=/LoginReset.jsp requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.198 Safari/537.36" dvchost=WAFirewall externalId=18af5e2d876-79ba7094 cn2=33121 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=13.150.40.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 33121 facilitycode: 23 facilitylabel: local7 fqdn: /LoginReset.jsp localhostname: WAFirewall localstarttime: 1696342399381 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:144.217.125.144'] vendorcode: 342 streamName: barracuda_waf clientIP: 13.150.40.227 serverIP: 239.23.166.100 userName: -
Explain this syslog message
<185>Oct 3 09:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=223.133.123.200 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=231.196.99.144 spt=33121 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 03 2023 09:13:19 rt=1696342399381 request=/LoginReset.jsp requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.198 Safari/537.36" dvchost=WAFirewall externalId=18af5e2d876-79ba7094 cn2=33121 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.196.99.144 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 33121, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/LoginReset.jsp", "localhostname": "WAFirewall", "localstarttime": "1696342399381 ", "message": "<185>Oct 3 09:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=223.133.123.200 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=231.196.99.144 spt=33121 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 03 2023 09:13:19 rt=1696342399381 request=/LoginReset.jsp requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.198 Safari/537.36\" dvchost=WAFirewall externalId=18af5e2d876-79ba7094 cn2=33121 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.196.99.144 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:144.217.125.144" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "231.196.99.144", "serverIP": "223.133.123.200", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 3 09:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=223.133.123.200 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=231.196.99.144 spt=33121 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 03 2023 09:13:19 rt=1696342399381 request=/LoginReset.jsp requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.198 Safari/537.36" dvchost=WAFirewall externalId=18af5e2d876-79ba7094 cn2=33121 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.196.99.144 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 3 09:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=223.133.123.200 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=231.196.99.144 spt=33121 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 03 2023 09:13:19 rt=1696342399381 request=/LoginReset.jsp requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.198 Safari/537.36" dvchost=WAFirewall externalId=18af5e2d876-79ba7094 cn2=33121 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.196.99.144 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 33121 facilitycode: 23 facilitylabel: local7 fqdn: /LoginReset.jsp localhostname: WAFirewall localstarttime: 1696342399381 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:144.217.125.144'] vendorcode: 342 streamName: barracuda_waf clientIP: 231.196.99.144 serverIP: 223.133.123.200 userName: -
Explain this syslog message
<185>Oct 3 09:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=243.119.43.17 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=34.1.16.254 spt=33121 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 03 2023 09:13:19 rt=1696342399381 request=/LoginReset.jsp requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.198 Safari/537.36" dvchost=WAFirewall externalId=18af5e2d876-79ba7094 cn2=33121 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=34.1.16.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 33121, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/LoginReset.jsp", "localhostname": "WAFirewall", "localstarttime": "1696342399381 ", "message": "<185>Oct 3 09:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=243.119.43.17 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=34.1.16.254 spt=33121 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 03 2023 09:13:19 rt=1696342399381 request=/LoginReset.jsp requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.198 Safari/537.36\" dvchost=WAFirewall externalId=18af5e2d876-79ba7094 cn2=33121 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=34.1.16.254 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:144.217.125.144" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "34.1.16.254", "serverIP": "243.119.43.17", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 3 09:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=243.119.43.17 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=34.1.16.254 spt=33121 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 03 2023 09:13:19 rt=1696342399381 request=/LoginReset.jsp requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.198 Safari/537.36" dvchost=WAFirewall externalId=18af5e2d876-79ba7094 cn2=33121 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=34.1.16.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 3 09:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=243.119.43.17 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=34.1.16.254 spt=33121 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 03 2023 09:13:19 rt=1696342399381 request=/LoginReset.jsp requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.198 Safari/537.36" dvchost=WAFirewall externalId=18af5e2d876-79ba7094 cn2=33121 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=34.1.16.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 33121 facilitycode: 23 facilitylabel: local7 fqdn: /LoginReset.jsp localhostname: WAFirewall localstarttime: 1696342399381 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:144.217.125.144'] vendorcode: 342 streamName: barracuda_waf clientIP: 34.1.16.254 serverIP: 243.119.43.17 userName: -
Explain this syslog message
<185>Feb 25 07:05:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=219.117.169.92 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=215.82.179.170 spt=9927 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 25 2023 07:05:19 rt=1677330319216 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0" dvchost=WAFirewall externalId=18688ad8770-4ca062a1 cn2=9927 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=215.82.179.170 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf", "ProxyIP:64.62.197.197" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 25 07:05:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=219.117.169.92 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=215.82.179.170 spt=9927 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 25 2023 07:05:19 rt=1677330319216 request=/ requestClientApplication=\"Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0\" dvchost=WAFirewall externalId=18688ad8770-4ca062a1 cn2=9927 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=215.82.179.170 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1677330319216 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 9927, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "215.82.179.170", "serverIP": "219.117.169.92", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 25 07:05:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=219.117.169.92 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=215.82.179.170 spt=9927 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 25 2023 07:05:19 rt=1677330319216 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0" dvchost=WAFirewall externalId=18688ad8770-4ca062a1 cn2=9927 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=215.82.179.170 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 25 07:05:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=219.117.169.92 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=215.82.179.170 spt=9927 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 25 2023 07:05:19 rt=1677330319216 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0" dvchost=WAFirewall externalId=18688ad8770-4ca062a1 cn2=9927 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=215.82.179.170 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf', 'ProxyIP:64.62.197.197'] productids: [0] sourceinfo: unknown localstarttime: 1677330319216 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 9927 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 215.82.179.170 serverIP: 219.117.169.92 userName: -
Explain this syslog message
<185>Feb 25 07:05:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=119.163.107.68 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=51.234.255.89 spt=9927 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 25 2023 07:05:19 rt=1677330319216 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0" dvchost=WAFirewall externalId=18688ad8770-4ca062a1 cn2=9927 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.234.255.89 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf", "ProxyIP:64.62.197.197" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 25 07:05:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=119.163.107.68 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=51.234.255.89 spt=9927 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 25 2023 07:05:19 rt=1677330319216 request=/ requestClientApplication=\"Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0\" dvchost=WAFirewall externalId=18688ad8770-4ca062a1 cn2=9927 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.234.255.89 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1677330319216 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 9927, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "51.234.255.89", "serverIP": "119.163.107.68", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 25 07:05:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=119.163.107.68 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=51.234.255.89 spt=9927 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 25 2023 07:05:19 rt=1677330319216 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0" dvchost=WAFirewall externalId=18688ad8770-4ca062a1 cn2=9927 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.234.255.89 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 25 07:05:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=119.163.107.68 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=51.234.255.89 spt=9927 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 25 2023 07:05:19 rt=1677330319216 request=/ requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0" dvchost=WAFirewall externalId=18688ad8770-4ca062a1 cn2=9927 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.234.255.89 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf', 'ProxyIP:64.62.197.197'] productids: [0] sourceinfo: unknown localstarttime: 1677330319216 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 9927 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 51.234.255.89 serverIP: 119.163.107.68 userName: -
Explain this syslog message