input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f ::: program=Microsoft OneDrive ::: message={"_id":"a533abc31101969f3a41697c","access_method":"Client","acked":"false","action":"alert","activity":"Download","alert":"yes","alert_name":"DLP PCI Alert","alert_type":"DLP","app":"Microsoft OneDrive","app_session_id":3483912176895852176,"appcategory":"Cloud Storage","appsuite":"Microsoft Live","browser":"Native","browser_session_id":4752751631097491507,"category":"Cloud Storage","ccl":"high","connection_id":2762431970988418783,"device":"Windows Device","device_classification":"unmanaged","dlp_incident_id":4233141258481957646,"dlp_is_unique_count":"false","dlp_parent_id":4233141258481957646,"dlp_profile":"Payment Card Industry Data Security Standard. PCI-DSS","dlp_rule":"INTL-PAN-Name","dlp_rule_count":14375,"dlp_rule_severity":"Critical","dst_country":"US","dst_location":"Redmond","dst_region":"Washington","dst_timezone":"America/Los_Angeles","dst_zipcode":"N/A","dstip":"165.130.133.250","file_lang":"ENGLISH","file_size":10256549,"file_type":"text/plain","hostname":"Jenga-Surface","incident_id":1523448449225732235,"managed_app":"yes","md5":"2f6df9969215d9eb4d266dd636337da7","object_type":"File","organization_unit":"","os":"Windows 11","os_version":"Windows 11","outer_doc_type":0,"page":"ahokbw.sn.files.1drv.com","page_site":"Microsoft OneDrive","policy":"DLP PCI Alert","policy_id":"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367","protocol":"HTTPS/1.1","request_id":2735518334081635584,"scan_type":"","severity":"unknown","sha256":"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f","site":"Microsoft OneDrive","src_country":"US","src_location":"San Diego","src_region":"California","src_time":"Wed Dec 20 14:33:08 2023","src_timezone":"America/Los_Angeles","src_zipcode":"92110","srcip":"196.146.164.186","timestamp":1703111613,"traffic_type":"CloudApp","transaction_id":1523448449225732235,"true_obj_category":"Text","true_obj_type":"Plain Text file","true_type_id":2,"tss_mode":"inline","type":"nspolicy","ur_normalized":"bob","url":"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k","user":"bob","userip":"192.168.1.194","userkey":"bob","dynamic_classification":"","message_size":0,"universal_connector":"","displayName":"","mime_type":"","violating_user":"","user_id":"","file_cls_encrypted":false,"sAMAccountName":"","channel":"","orignal_file_path":"","data_type":"","classification_name":"","userPrincipalName":"","from_storage":"","owner_pdl":"","group":"","total_collaborator_count":0,"message_id":"","dlp_file":"credit_cards.12.db","instance_id":"","browser_version":"","exposure":"","act_user":"","dlp_unique_count":0,"smtp_to":[],"suppression_key":"credit_cards.12.db","external_collaborator_count":0,"file_category":"","collaborated":"","manager":"","mail":"","sub_type":"","app_activity":"","managementID":"","file_path":"","to_storage":"","dlp_mail_parent_id":"","dlp_fingerprint_match":"","retro_scan_name":"","src_geoip_src":0,"userCountry":"","file_password_protected":"","web_universal_connector":"","dlp_fingerprint_score":0,"sanctioned_instance":"","referer":"","parent_id":"","title":"credit_cards.12.db","to_user":"","shared_with":"","dst_geoip_src":0,"object_id":"","from_user":"","shared_domains":"","instance":"","modified":0,"true_filetype":"","dlp_rule_score":0,"dlp_fingerprint_classification":"","violating_user_type":"","local_sha256":"","object":"credit_cards.12.db","owner":"","bcc":""} ::: fileHashType=sha256 ::: clientHostname=Jenga-Surface ::: startTimeUTC=2023-12-20T22:33:33Z ::: streamName=netskope ::: messageType=data_exfiltration ::: serverIP=165.130.133.250 ::: userName=bob ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),Payment Card Industry Data Security Standard. PCI-DSS,INTL-PAN-Name] ::: clientIP=196.146.164.186
{ "clienthostname": "Jenga-Surface", "filehash": "26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f", "message": "WitFoo-Artifact ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f ::: program=Microsoft OneDrive ::: message={\"_id\":\"a533abc31101969f3a41697c\",\"access_method\":\"Client\",\"acked\":\"false\",\"action\":\"alert\",\"activity\":\"Download\",\"alert\":\"yes\",\"alert_name\":\"DLP PCI Alert\",\"alert_type\":\"DLP\",\"app\":\"Microsoft OneDrive\",\"app_session_id\":3483912176895852176,\"appcategory\":\"Cloud Storage\",\"appsuite\":\"Microsoft Live\",\"browser\":\"Native\",\"browser_session_id\":4752751631097491507,\"category\":\"Cloud Storage\",\"ccl\":\"high\",\"connection_id\":2762431970988418783,\"device\":\"Windows Device\",\"device_classification\":\"unmanaged\",\"dlp_incident_id\":4233141258481957646,\"dlp_is_unique_count\":\"false\",\"dlp_parent_id\":4233141258481957646,\"dlp_profile\":\"Payment Card Industry Data Security Standard. PCI-DSS\",\"dlp_rule\":\"INTL-PAN-Name\",\"dlp_rule_count\":14375,\"dlp_rule_severity\":\"Critical\",\"dst_country\":\"US\",\"dst_location\":\"Redmond\",\"dst_region\":\"Washington\",\"dst_timezone\":\"America/Los_Angeles\",\"dst_zipcode\":\"N/A\",\"dstip\":\"165.130.133.250\",\"file_lang\":\"ENGLISH\",\"file_size\":10256549,\"file_type\":\"text/plain\",\"hostname\":\"Jenga-Surface\",\"incident_id\":1523448449225732235,\"managed_app\":\"yes\",\"md5\":\"2f6df9969215d9eb4d266dd636337da7\",\"object_type\":\"File\",\"organization_unit\":\"\",\"os\":\"Windows 11\",\"os_version\":\"Windows 11\",\"outer_doc_type\":0,\"page\":\"ahokbw.sn.files.1drv.com\",\"page_site\":\"Microsoft OneDrive\",\"policy\":\"DLP PCI Alert\",\"policy_id\":\"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367\",\"protocol\":\"HTTPS/1.1\",\"request_id\":2735518334081635584,\"scan_type\":\"\",\"severity\":\"unknown\",\"sha256\":\"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f\",\"site\":\"Microsoft OneDrive\",\"src_country\":\"US\",\"src_location\":\"San Diego\",\"src_region\":\"California\",\"src_time\":\"Wed Dec 20 14:33:08 2023\",\"src_timezone\":\"America/Los_Angeles\",\"src_zipcode\":\"92110\",\"srcip\":\"196.146.164.186\",\"timestamp\":1703111613,\"traffic_type\":\"CloudApp\",\"transaction_id\":1523448449225732235,\"true_obj_category\":\"Text\",\"true_obj_type\":\"Plain Text file\",\"true_type_id\":2,\"tss_mode\":\"inline\",\"type\":\"nspolicy\",\"ur_normalized\":\"bob\",\"url\":\"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k\",\"user\":\"bob\",\"userip\":\"192.168.1.194\",\"userkey\":\"bob\",\"dynamic_classification\":\"\",\"message_size\":0,\"universal_connector\":\"\",\"displayName\":\"\",\"mime_type\":\"\",\"violating_user\":\"\",\"user_id\":\"\",\"file_cls_encrypted\":false,\"sAMAccountName\":\"\",\"channel\":\"\",\"orignal_file_path\":\"\",\"data_type\":\"\",\"classification_name\":\"\",\"userPrincipalName\":\"\",\"from_storage\":\"\",\"owner_pdl\":\"\",\"group\":\"\",\"total_collaborator_count\":0,\"message_id\":\"\",\"dlp_file\":\"credit_cards.12.db\",\"instance_id\":\"\",\"browser_version\":\"\",\"exposure\":\"\",\"act_user\":\"\",\"dlp_unique_count\":0,\"smtp_to\":[],\"suppression_key\":\"credit_cards.12.db\",\"external_collaborator_count\":0,\"file_category\":\"\",\"collaborated\":\"\",\"manager\":\"\",\"mail\":\"\",\"sub_type\":\"\",\"app_activity\":\"\",\"managementID\":\"\",\"file_path\":\"\",\"to_storage\":\"\",\"dlp_mail_parent_id\":\"\",\"dlp_fingerprint_match\":\"\",\"retro_scan_name\":\"\",\"src_geoip_src\":0,\"userCountry\":\"\",\"file_password_protected\":\"\",\"web_universal_connector\":\"\",\"dlp_fingerprint_score\":0,\"sanctioned_instance\":\"\",\"referer\":\"\",\"parent_id\":\"\",\"title\":\"credit_cards.12.db\",\"to_user\":\"\",\"shared_with\":\"\",\"dst_geoip_src\":0,\"object_id\":\"\",\"from_user\":\"\",\"shared_domains\":\"\",\"instance\":\"\",\"modified\":0,\"true_filetype\":\"\",\"dlp_rule_score\":0,\"dlp_fingerprint_classification\":\"\",\"violating_user_type\":\"\",\"local_sha256\":\"\",\"object\":\"credit_cards.12.db\",\"owner\":\"\",\"bcc\":\"\"} ::: fileHashType=sha256 ::: clientHostname=Jenga-Surface ::: startTimeUTC=2023-12-20T22:33:33Z ::: streamName=netskope ::: messageType=data_exfiltration ::: serverIP=165.130.133.250 ::: userName=bob ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),Payment Card Industry Data Security Standard. PCI-DSS,INTL-PAN-Name] ::: clientIP=196.146.164.186", "messagetype": "data_exfiltration", "program": "Microsoft OneDrive", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "starttimeutc": "2023-12-20T22:33:33Z", "tags": [ "data_exfiltration", "netskope", "INTL-PAN-Name", "Payment Card Industry Data Security Standard. PCI-DSS", "Windows Device(unmanaged)", "DLP PCI Alert", "Cloud Storage", "Microsoft OneDrive" ], "streamName": "netskope", "clientIP": "196.146.164.186", "serverIP": "165.130.133.250", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f ::: program=Microsoft OneDrive ::: message={"_id":"a533abc31101969f3a41697c","access_method":"Client","acked":"false","action":"alert","activity":"Download","alert":"yes","alert_name":"DLP PCI Alert","alert_type":"DLP","app":"Microsoft OneDrive","app_session_id":3483912176895852176,"appcategory":"Cloud Storage","appsuite":"Microsoft Live","browser":"Native","browser_session_id":4752751631097491507,"category":"Cloud Storage","ccl":"high","connection_id":2762431970988418783,"device":"Windows Device","device_classification":"unmanaged","dlp_incident_id":4233141258481957646,"dlp_is_unique_count":"false","dlp_parent_id":4233141258481957646,"dlp_profile":"Payment Card Industry Data Security Standard. PCI-DSS","dlp_rule":"INTL-PAN-Name","dlp_rule_count":14375,"dlp_rule_severity":"Critical","dst_country":"US","dst_location":"Redmond","dst_region":"Washington","dst_timezone":"America/Los_Angeles","dst_zipcode":"N/A","dstip":"165.130.133.250","file_lang":"ENGLISH","file_size":10256549,"file_type":"text/plain","hostname":"Jenga-Surface","incident_id":1523448449225732235,"managed_app":"yes","md5":"2f6df9969215d9eb4d266dd636337da7","object_type":"File","organization_unit":"","os":"Windows 11","os_version":"Windows 11","outer_doc_type":0,"page":"ahokbw.sn.files.1drv.com","page_site":"Microsoft OneDrive","policy":"DLP PCI Alert","policy_id":"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367","protocol":"HTTPS/1.1","request_id":2735518334081635584,"scan_type":"","severity":"unknown","sha256":"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f","site":"Microsoft OneDrive","src_country":"US","src_location":"San Diego","src_region":"California","src_time":"Wed Dec 20 14:33:08 2023","src_timezone":"America/Los_Angeles","src_zipcode":"92110","srcip":"196.146.164.186","timestamp":1703111613,"traffic_type":"CloudApp","transaction_id":1523448449225732235,"true_obj_category":"Text","true_obj_type":"Plain Text file","true_type_id":2,"tss_mode":"inline","type":"nspolicy","ur_normalized":"bob","url":"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k","user":"bob","userip":"192.168.1.194","userkey":"bob","dynamic_classification":"","message_size":0,"universal_connector":"","displayName":"","mime_type":"","violating_user":"","user_id":"","file_cls_encrypted":false,"sAMAccountName":"","channel":"","orignal_file_path":"","data_type":"","classification_name":"","userPrincipalName":"","from_storage":"","owner_pdl":"","group":"","total_collaborator_count":0,"message_id":"","dlp_file":"credit_cards.12.db","instance_id":"","browser_version":"","exposure":"","act_user":"","dlp_unique_count":0,"smtp_to":[],"suppression_key":"credit_cards.12.db","external_collaborator_count":0,"file_category":"","collaborated":"","manager":"","mail":"","sub_type":"","app_activity":"","managementID":"","file_path":"","to_storage":"","dlp_mail_parent_id":"","dlp_fingerprint_match":"","retro_scan_name":"","src_geoip_src":0,"userCountry":"","file_password_protected":"","web_universal_connector":"","dlp_fingerprint_score":0,"sanctioned_instance":"","referer":"","parent_id":"","title":"credit_cards.12.db","to_user":"","shared_with":"","dst_geoip_src":0,"object_id":"","from_user":"","shared_domains":"","instance":"","modified":0,"true_filetype":"","dlp_rule_score":0,"dlp_fingerprint_classification":"","violating_user_type":"","local_sha256":"","object":"credit_cards.12.db","owner":"","bcc":""} ::: fileHashType=sha256 ::: clientHostname=Jenga-Surface ::: startTimeUTC=2023-12-20T22:33:33Z ::: streamName=netskope ::: messageType=data_exfiltration ::: serverIP=165.130.133.250 ::: userName=bob ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),Payment Card Industry Data Security Standard. PCI-DSS,INTL-PAN-Name] ::: clientIP=196.146.164.186
Product: Netskope Vendor: Netskope
Identify this syslog message
WitFoo-Artifact ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f ::: program=Microsoft OneDrive ::: message={"_id":"a533abc31101969f3a41697c","access_method":"Client","acked":"false","action":"alert","activity":"Download","alert":"yes","alert_name":"DLP PCI Alert","alert_type":"DLP","app":"Microsoft OneDrive","app_session_id":3483912176895852176,"appcategory":"Cloud Storage","appsuite":"Microsoft Live","browser":"Native","browser_session_id":4752751631097491507,"category":"Cloud Storage","ccl":"high","connection_id":2762431970988418783,"device":"Windows Device","device_classification":"unmanaged","dlp_incident_id":4233141258481957646,"dlp_is_unique_count":"false","dlp_parent_id":4233141258481957646,"dlp_profile":"Payment Card Industry Data Security Standard. PCI-DSS","dlp_rule":"INTL-PAN-Name","dlp_rule_count":14375,"dlp_rule_severity":"Critical","dst_country":"US","dst_location":"Redmond","dst_region":"Washington","dst_timezone":"America/Los_Angeles","dst_zipcode":"N/A","dstip":"165.130.133.250","file_lang":"ENGLISH","file_size":10256549,"file_type":"text/plain","hostname":"Jenga-Surface","incident_id":1523448449225732235,"managed_app":"yes","md5":"2f6df9969215d9eb4d266dd636337da7","object_type":"File","organization_unit":"","os":"Windows 11","os_version":"Windows 11","outer_doc_type":0,"page":"ahokbw.sn.files.1drv.com","page_site":"Microsoft OneDrive","policy":"DLP PCI Alert","policy_id":"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367","protocol":"HTTPS/1.1","request_id":2735518334081635584,"scan_type":"","severity":"unknown","sha256":"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f","site":"Microsoft OneDrive","src_country":"US","src_location":"San Diego","src_region":"California","src_time":"Wed Dec 20 14:33:08 2023","src_timezone":"America/Los_Angeles","src_zipcode":"92110","srcip":"196.146.164.186","timestamp":1703111613,"traffic_type":"CloudApp","transaction_id":1523448449225732235,"true_obj_category":"Text","true_obj_type":"Plain Text file","true_type_id":2,"tss_mode":"inline","type":"nspolicy","ur_normalized":"bob","url":"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k","user":"bob","userip":"192.168.1.194","userkey":"bob","dynamic_classification":"","message_size":0,"universal_connector":"","displayName":"","mime_type":"","violating_user":"","user_id":"","file_cls_encrypted":false,"sAMAccountName":"","channel":"","orignal_file_path":"","data_type":"","classification_name":"","userPrincipalName":"","from_storage":"","owner_pdl":"","group":"","total_collaborator_count":0,"message_id":"","dlp_file":"credit_cards.12.db","instance_id":"","browser_version":"","exposure":"","act_user":"","dlp_unique_count":0,"smtp_to":[],"suppression_key":"credit_cards.12.db","external_collaborator_count":0,"file_category":"","collaborated":"","manager":"","mail":"","sub_type":"","app_activity":"","managementID":"","file_path":"","to_storage":"","dlp_mail_parent_id":"","dlp_fingerprint_match":"","retro_scan_name":"","src_geoip_src":0,"userCountry":"","file_password_protected":"","web_universal_connector":"","dlp_fingerprint_score":0,"sanctioned_instance":"","referer":"","parent_id":"","title":"credit_cards.12.db","to_user":"","shared_with":"","dst_geoip_src":0,"object_id":"","from_user":"","shared_domains":"","instance":"","modified":0,"true_filetype":"","dlp_rule_score":0,"dlp_fingerprint_classification":"","violating_user_type":"","local_sha256":"","object":"credit_cards.12.db","owner":"","bcc":""} ::: fileHashType=sha256 ::: clientHostname=Jenga-Surface ::: startTimeUTC=2023-12-20T22:33:33Z ::: streamName=netskope ::: messageType=data_exfiltration ::: serverIP=165.130.133.250 ::: userName=bob ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),Payment Card Industry Data Security Standard. PCI-DSS,INTL-PAN-Name] ::: clientIP=196.146.164.186
This is a syslog message from a product called Netskope by Netskope. The following fields were extracted from the message: clienthostname: Jenga-Surface filehash: 26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f messagetype: data_exfiltration program: Microsoft OneDrive senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown starttimeutc: 2023-12-20T22:33:33Z tags: ['data_exfiltration', 'netskope', 'INTL-PAN-Name', 'Payment Card Industry Data Security Standard. PCI-DSS', 'Windows Device(unmanaged)', 'DLP PCI Alert', 'Cloud Storage', 'Microsoft OneDrive'] streamName: netskope clientIP: 196.146.164.186 serverIP: 165.130.133.250 userName: bob
Explain this syslog message
WitFoo-Artifact ::: messageType=data_exfiltration ::: userName=charlie ::: clientHostname=Jenga-Surface ::: program=Microsoft OneDrive ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),DLP-PCI,Name-Credit Card (CC)] ::: message={"_id":"c5a301b62ac8d92b330ebb07","access_method":"Client","acked":"false","action":"alert","activity":"Download","alert":"yes","alert_name":"DLP PCI Alert","alert_type":"DLP","app":"Microsoft OneDrive","app_session_id":3483912176895852176,"appcategory":"Cloud Storage","appsuite":"Microsoft Live","browser":"Native","browser_session_id":4752751631097491507,"category":"Cloud Storage","ccl":"high","connection_id":2762431970988418783,"device":"Windows Device","device_classification":"unmanaged","dlp_incident_id":4233141258481957646,"dlp_is_unique_count":"false","dlp_parent_id":4233141258481957646,"dlp_profile":"DLP-PCI","dlp_rule":"Name-Credit Card (CC)","dlp_rule_count":179687,"dlp_rule_severity":"Critical","dst_country":"US","dst_location":"Redmond","dst_region":"Washington","dst_timezone":"America/Los_Angeles","dst_zipcode":"N/A","dstip":"16.31.95.68","file_lang":"ENGLISH","file_size":10256549,"file_type":"text/plain","hostname":"Jenga-Surface","incident_id":1523448449225732235,"managed_app":"yes","md5":"2f6df9969215d9eb4d266dd636337da7","object_type":"File","organization_unit":"","os":"Windows 11","os_version":"Windows 11","outer_doc_type":0,"page":"ahokbw.sn.files.1drv.com","page_site":"Microsoft OneDrive","policy":"DLP PCI Alert","policy_id":"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367","protocol":"HTTPS/1.1","request_id":2735518334081635584,"scan_type":"","severity":"unknown","sha256":"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f","site":"Microsoft OneDrive","src_country":"US","src_location":"San Diego","src_region":"California","src_time":"Wed Dec 20 14:33:08 2023","src_timezone":"America/Los_Angeles","src_zipcode":"92110","srcip":"144.51.136.197","timestamp":1703111613,"traffic_type":"CloudApp","transaction_id":1523448449225732235,"true_obj_category":"Text","true_obj_type":"Plain Text file","true_type_id":2,"tss_mode":"inline","type":"nspolicy","ur_normalized":"charlie","url":"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k","user":"charlie","userip":"192.168.1.194","userkey":"charlie","dynamic_classification":"","message_size":0,"universal_connector":"","displayName":"","mime_type":"","violating_user":"","user_id":"","file_cls_encrypted":false,"sAMAccountName":"","channel":"","orignal_file_path":"","data_type":"","classification_name":"","userPrincipalName":"","from_storage":"","owner_pdl":"","group":"","total_collaborator_count":0,"message_id":"","dlp_file":"credit_cards.12.db","instance_id":"","browser_version":"","exposure":"","act_user":"","dlp_unique_count":0,"smtp_to":[],"suppression_key":"credit_cards.12.db","external_collaborator_count":0,"file_category":"","collaborated":"","manager":"","mail":"","sub_type":"","app_activity":"","managementID":"","file_path":"","to_storage":"","dlp_mail_parent_id":"","dlp_fingerprint_match":"","retro_scan_name":"","src_geoip_src":0,"userCountry":"","file_password_protected":"","web_universal_connector":"","dlp_fingerprint_score":0,"sanctioned_instance":"","referer":"","parent_id":"","title":"credit_cards.12.db","to_user":"","shared_with":"","dst_geoip_src":0,"object_id":"","from_user":"","shared_domains":"","instance":"","modified":0,"true_filetype":"","dlp_rule_score":0,"dlp_fingerprint_classification":"","violating_user_type":"","local_sha256":"","object":"credit_cards.12.db","owner":"","bcc":""} ::: clientIP=144.51.136.197 ::: serverIP=16.31.95.68 ::: fileHashType=sha256 ::: streamName=netskope ::: startTimeUTC=2023-12-20T22:33:33Z ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f
{ "clienthostname": "Jenga-Surface", "filehash": "26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f", "message": "WitFoo-Artifact ::: messageType=data_exfiltration ::: userName=charlie ::: clientHostname=Jenga-Surface ::: program=Microsoft OneDrive ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),DLP-PCI,Name-Credit Card (CC)] ::: message={\"_id\":\"c5a301b62ac8d92b330ebb07\",\"access_method\":\"Client\",\"acked\":\"false\",\"action\":\"alert\",\"activity\":\"Download\",\"alert\":\"yes\",\"alert_name\":\"DLP PCI Alert\",\"alert_type\":\"DLP\",\"app\":\"Microsoft OneDrive\",\"app_session_id\":3483912176895852176,\"appcategory\":\"Cloud Storage\",\"appsuite\":\"Microsoft Live\",\"browser\":\"Native\",\"browser_session_id\":4752751631097491507,\"category\":\"Cloud Storage\",\"ccl\":\"high\",\"connection_id\":2762431970988418783,\"device\":\"Windows Device\",\"device_classification\":\"unmanaged\",\"dlp_incident_id\":4233141258481957646,\"dlp_is_unique_count\":\"false\",\"dlp_parent_id\":4233141258481957646,\"dlp_profile\":\"DLP-PCI\",\"dlp_rule\":\"Name-Credit Card (CC)\",\"dlp_rule_count\":179687,\"dlp_rule_severity\":\"Critical\",\"dst_country\":\"US\",\"dst_location\":\"Redmond\",\"dst_region\":\"Washington\",\"dst_timezone\":\"America/Los_Angeles\",\"dst_zipcode\":\"N/A\",\"dstip\":\"16.31.95.68\",\"file_lang\":\"ENGLISH\",\"file_size\":10256549,\"file_type\":\"text/plain\",\"hostname\":\"Jenga-Surface\",\"incident_id\":1523448449225732235,\"managed_app\":\"yes\",\"md5\":\"2f6df9969215d9eb4d266dd636337da7\",\"object_type\":\"File\",\"organization_unit\":\"\",\"os\":\"Windows 11\",\"os_version\":\"Windows 11\",\"outer_doc_type\":0,\"page\":\"ahokbw.sn.files.1drv.com\",\"page_site\":\"Microsoft OneDrive\",\"policy\":\"DLP PCI Alert\",\"policy_id\":\"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367\",\"protocol\":\"HTTPS/1.1\",\"request_id\":2735518334081635584,\"scan_type\":\"\",\"severity\":\"unknown\",\"sha256\":\"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f\",\"site\":\"Microsoft OneDrive\",\"src_country\":\"US\",\"src_location\":\"San Diego\",\"src_region\":\"California\",\"src_time\":\"Wed Dec 20 14:33:08 2023\",\"src_timezone\":\"America/Los_Angeles\",\"src_zipcode\":\"92110\",\"srcip\":\"144.51.136.197\",\"timestamp\":1703111613,\"traffic_type\":\"CloudApp\",\"transaction_id\":1523448449225732235,\"true_obj_category\":\"Text\",\"true_obj_type\":\"Plain Text file\",\"true_type_id\":2,\"tss_mode\":\"inline\",\"type\":\"nspolicy\",\"ur_normalized\":\"charlie\",\"url\":\"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k\",\"user\":\"charlie\",\"userip\":\"192.168.1.194\",\"userkey\":\"charlie\",\"dynamic_classification\":\"\",\"message_size\":0,\"universal_connector\":\"\",\"displayName\":\"\",\"mime_type\":\"\",\"violating_user\":\"\",\"user_id\":\"\",\"file_cls_encrypted\":false,\"sAMAccountName\":\"\",\"channel\":\"\",\"orignal_file_path\":\"\",\"data_type\":\"\",\"classification_name\":\"\",\"userPrincipalName\":\"\",\"from_storage\":\"\",\"owner_pdl\":\"\",\"group\":\"\",\"total_collaborator_count\":0,\"message_id\":\"\",\"dlp_file\":\"credit_cards.12.db\",\"instance_id\":\"\",\"browser_version\":\"\",\"exposure\":\"\",\"act_user\":\"\",\"dlp_unique_count\":0,\"smtp_to\":[],\"suppression_key\":\"credit_cards.12.db\",\"external_collaborator_count\":0,\"file_category\":\"\",\"collaborated\":\"\",\"manager\":\"\",\"mail\":\"\",\"sub_type\":\"\",\"app_activity\":\"\",\"managementID\":\"\",\"file_path\":\"\",\"to_storage\":\"\",\"dlp_mail_parent_id\":\"\",\"dlp_fingerprint_match\":\"\",\"retro_scan_name\":\"\",\"src_geoip_src\":0,\"userCountry\":\"\",\"file_password_protected\":\"\",\"web_universal_connector\":\"\",\"dlp_fingerprint_score\":0,\"sanctioned_instance\":\"\",\"referer\":\"\",\"parent_id\":\"\",\"title\":\"credit_cards.12.db\",\"to_user\":\"\",\"shared_with\":\"\",\"dst_geoip_src\":0,\"object_id\":\"\",\"from_user\":\"\",\"shared_domains\":\"\",\"instance\":\"\",\"modified\":0,\"true_filetype\":\"\",\"dlp_rule_score\":0,\"dlp_fingerprint_classification\":\"\",\"violating_user_type\":\"\",\"local_sha256\":\"\",\"object\":\"credit_cards.12.db\",\"owner\":\"\",\"bcc\":\"\"} ::: clientIP=144.51.136.197 ::: serverIP=16.31.95.68 ::: fileHashType=sha256 ::: streamName=netskope ::: startTimeUTC=2023-12-20T22:33:33Z ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f", "messagetype": "data_exfiltration", "program": "Microsoft OneDrive", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "starttimeutc": "2023-12-20T22:33:33Z", "tags": [ "data_exfiltration", "Name-Credit Card (CC)", "netskope", "Windows Device(unmanaged)", "Cloud Storage", "Microsoft OneDrive", "DLP PCI Alert", "DLP-PCI" ], "streamName": "netskope", "clientIP": "144.51.136.197", "serverIP": "16.31.95.68", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: messageType=data_exfiltration ::: userName=charlie ::: clientHostname=Jenga-Surface ::: program=Microsoft OneDrive ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),DLP-PCI,Name-Credit Card (CC)] ::: message={"_id":"c5a301b62ac8d92b330ebb07","access_method":"Client","acked":"false","action":"alert","activity":"Download","alert":"yes","alert_name":"DLP PCI Alert","alert_type":"DLP","app":"Microsoft OneDrive","app_session_id":3483912176895852176,"appcategory":"Cloud Storage","appsuite":"Microsoft Live","browser":"Native","browser_session_id":4752751631097491507,"category":"Cloud Storage","ccl":"high","connection_id":2762431970988418783,"device":"Windows Device","device_classification":"unmanaged","dlp_incident_id":4233141258481957646,"dlp_is_unique_count":"false","dlp_parent_id":4233141258481957646,"dlp_profile":"DLP-PCI","dlp_rule":"Name-Credit Card (CC)","dlp_rule_count":179687,"dlp_rule_severity":"Critical","dst_country":"US","dst_location":"Redmond","dst_region":"Washington","dst_timezone":"America/Los_Angeles","dst_zipcode":"N/A","dstip":"16.31.95.68","file_lang":"ENGLISH","file_size":10256549,"file_type":"text/plain","hostname":"Jenga-Surface","incident_id":1523448449225732235,"managed_app":"yes","md5":"2f6df9969215d9eb4d266dd636337da7","object_type":"File","organization_unit":"","os":"Windows 11","os_version":"Windows 11","outer_doc_type":0,"page":"ahokbw.sn.files.1drv.com","page_site":"Microsoft OneDrive","policy":"DLP PCI Alert","policy_id":"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367","protocol":"HTTPS/1.1","request_id":2735518334081635584,"scan_type":"","severity":"unknown","sha256":"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f","site":"Microsoft OneDrive","src_country":"US","src_location":"San Diego","src_region":"California","src_time":"Wed Dec 20 14:33:08 2023","src_timezone":"America/Los_Angeles","src_zipcode":"92110","srcip":"144.51.136.197","timestamp":1703111613,"traffic_type":"CloudApp","transaction_id":1523448449225732235,"true_obj_category":"Text","true_obj_type":"Plain Text file","true_type_id":2,"tss_mode":"inline","type":"nspolicy","ur_normalized":"charlie","url":"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k","user":"charlie","userip":"192.168.1.194","userkey":"charlie","dynamic_classification":"","message_size":0,"universal_connector":"","displayName":"","mime_type":"","violating_user":"","user_id":"","file_cls_encrypted":false,"sAMAccountName":"","channel":"","orignal_file_path":"","data_type":"","classification_name":"","userPrincipalName":"","from_storage":"","owner_pdl":"","group":"","total_collaborator_count":0,"message_id":"","dlp_file":"credit_cards.12.db","instance_id":"","browser_version":"","exposure":"","act_user":"","dlp_unique_count":0,"smtp_to":[],"suppression_key":"credit_cards.12.db","external_collaborator_count":0,"file_category":"","collaborated":"","manager":"","mail":"","sub_type":"","app_activity":"","managementID":"","file_path":"","to_storage":"","dlp_mail_parent_id":"","dlp_fingerprint_match":"","retro_scan_name":"","src_geoip_src":0,"userCountry":"","file_password_protected":"","web_universal_connector":"","dlp_fingerprint_score":0,"sanctioned_instance":"","referer":"","parent_id":"","title":"credit_cards.12.db","to_user":"","shared_with":"","dst_geoip_src":0,"object_id":"","from_user":"","shared_domains":"","instance":"","modified":0,"true_filetype":"","dlp_rule_score":0,"dlp_fingerprint_classification":"","violating_user_type":"","local_sha256":"","object":"credit_cards.12.db","owner":"","bcc":""} ::: clientIP=144.51.136.197 ::: serverIP=16.31.95.68 ::: fileHashType=sha256 ::: streamName=netskope ::: startTimeUTC=2023-12-20T22:33:33Z ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f
Product: Netskope Vendor: Netskope
Identify this syslog message
WitFoo-Artifact ::: messageType=data_exfiltration ::: userName=charlie ::: clientHostname=Jenga-Surface ::: program=Microsoft OneDrive ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),DLP-PCI,Name-Credit Card (CC)] ::: message={"_id":"c5a301b62ac8d92b330ebb07","access_method":"Client","acked":"false","action":"alert","activity":"Download","alert":"yes","alert_name":"DLP PCI Alert","alert_type":"DLP","app":"Microsoft OneDrive","app_session_id":3483912176895852176,"appcategory":"Cloud Storage","appsuite":"Microsoft Live","browser":"Native","browser_session_id":4752751631097491507,"category":"Cloud Storage","ccl":"high","connection_id":2762431970988418783,"device":"Windows Device","device_classification":"unmanaged","dlp_incident_id":4233141258481957646,"dlp_is_unique_count":"false","dlp_parent_id":4233141258481957646,"dlp_profile":"DLP-PCI","dlp_rule":"Name-Credit Card (CC)","dlp_rule_count":179687,"dlp_rule_severity":"Critical","dst_country":"US","dst_location":"Redmond","dst_region":"Washington","dst_timezone":"America/Los_Angeles","dst_zipcode":"N/A","dstip":"16.31.95.68","file_lang":"ENGLISH","file_size":10256549,"file_type":"text/plain","hostname":"Jenga-Surface","incident_id":1523448449225732235,"managed_app":"yes","md5":"2f6df9969215d9eb4d266dd636337da7","object_type":"File","organization_unit":"","os":"Windows 11","os_version":"Windows 11","outer_doc_type":0,"page":"ahokbw.sn.files.1drv.com","page_site":"Microsoft OneDrive","policy":"DLP PCI Alert","policy_id":"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367","protocol":"HTTPS/1.1","request_id":2735518334081635584,"scan_type":"","severity":"unknown","sha256":"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f","site":"Microsoft OneDrive","src_country":"US","src_location":"San Diego","src_region":"California","src_time":"Wed Dec 20 14:33:08 2023","src_timezone":"America/Los_Angeles","src_zipcode":"92110","srcip":"144.51.136.197","timestamp":1703111613,"traffic_type":"CloudApp","transaction_id":1523448449225732235,"true_obj_category":"Text","true_obj_type":"Plain Text file","true_type_id":2,"tss_mode":"inline","type":"nspolicy","ur_normalized":"charlie","url":"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k","user":"charlie","userip":"192.168.1.194","userkey":"charlie","dynamic_classification":"","message_size":0,"universal_connector":"","displayName":"","mime_type":"","violating_user":"","user_id":"","file_cls_encrypted":false,"sAMAccountName":"","channel":"","orignal_file_path":"","data_type":"","classification_name":"","userPrincipalName":"","from_storage":"","owner_pdl":"","group":"","total_collaborator_count":0,"message_id":"","dlp_file":"credit_cards.12.db","instance_id":"","browser_version":"","exposure":"","act_user":"","dlp_unique_count":0,"smtp_to":[],"suppression_key":"credit_cards.12.db","external_collaborator_count":0,"file_category":"","collaborated":"","manager":"","mail":"","sub_type":"","app_activity":"","managementID":"","file_path":"","to_storage":"","dlp_mail_parent_id":"","dlp_fingerprint_match":"","retro_scan_name":"","src_geoip_src":0,"userCountry":"","file_password_protected":"","web_universal_connector":"","dlp_fingerprint_score":0,"sanctioned_instance":"","referer":"","parent_id":"","title":"credit_cards.12.db","to_user":"","shared_with":"","dst_geoip_src":0,"object_id":"","from_user":"","shared_domains":"","instance":"","modified":0,"true_filetype":"","dlp_rule_score":0,"dlp_fingerprint_classification":"","violating_user_type":"","local_sha256":"","object":"credit_cards.12.db","owner":"","bcc":""} ::: clientIP=144.51.136.197 ::: serverIP=16.31.95.68 ::: fileHashType=sha256 ::: streamName=netskope ::: startTimeUTC=2023-12-20T22:33:33Z ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f
This is a syslog message from a product called Netskope by Netskope. The following fields were extracted from the message: clienthostname: Jenga-Surface filehash: 26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f messagetype: data_exfiltration program: Microsoft OneDrive senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown starttimeutc: 2023-12-20T22:33:33Z tags: ['data_exfiltration', 'Name-Credit Card (CC)', 'netskope', 'Windows Device(unmanaged)', 'Cloud Storage', 'Microsoft OneDrive', 'DLP PCI Alert', 'DLP-PCI'] streamName: netskope clientIP: 144.51.136.197 serverIP: 16.31.95.68 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f ::: program=Microsoft OneDrive ::: message={"_id":"a533abc31101969f3a41697c","access_method":"Client","acked":"false","action":"alert","activity":"Download","alert":"yes","alert_name":"DLP PCI Alert","alert_type":"DLP","app":"Microsoft OneDrive","app_session_id":3483912176895852176,"appcategory":"Cloud Storage","appsuite":"Microsoft Live","browser":"Native","browser_session_id":4752751631097491507,"category":"Cloud Storage","ccl":"high","connection_id":2762431970988418783,"device":"Windows Device","device_classification":"unmanaged","dlp_incident_id":4233141258481957646,"dlp_is_unique_count":"false","dlp_parent_id":4233141258481957646,"dlp_profile":"Payment Card Industry Data Security Standard. PCI-DSS","dlp_rule":"INTL-PAN-Name","dlp_rule_count":14375,"dlp_rule_severity":"Critical","dst_country":"US","dst_location":"Redmond","dst_region":"Washington","dst_timezone":"America/Los_Angeles","dst_zipcode":"N/A","dstip":"211.187.88.142","file_lang":"ENGLISH","file_size":10256549,"file_type":"text/plain","hostname":"Jenga-Surface","incident_id":1523448449225732235,"managed_app":"yes","md5":"2f6df9969215d9eb4d266dd636337da7","object_type":"File","organization_unit":"","os":"Windows 11","os_version":"Windows 11","outer_doc_type":0,"page":"ahokbw.sn.files.1drv.com","page_site":"Microsoft OneDrive","policy":"DLP PCI Alert","policy_id":"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367","protocol":"HTTPS/1.1","request_id":2735518334081635584,"scan_type":"","severity":"unknown","sha256":"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f","site":"Microsoft OneDrive","src_country":"US","src_location":"San Diego","src_region":"California","src_time":"Wed Dec 20 14:33:08 2023","src_timezone":"America/Los_Angeles","src_zipcode":"92110","srcip":"134.239.215.2","timestamp":1703111613,"traffic_type":"CloudApp","transaction_id":1523448449225732235,"true_obj_category":"Text","true_obj_type":"Plain Text file","true_type_id":2,"tss_mode":"inline","type":"nspolicy","ur_normalized":"alice","url":"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k","user":"alice","userip":"192.168.1.194","userkey":"alice","dynamic_classification":"","message_size":0,"universal_connector":"","displayName":"","mime_type":"","violating_user":"","user_id":"","file_cls_encrypted":false,"sAMAccountName":"","channel":"","orignal_file_path":"","data_type":"","classification_name":"","userPrincipalName":"","from_storage":"","owner_pdl":"","group":"","total_collaborator_count":0,"message_id":"","dlp_file":"credit_cards.12.db","instance_id":"","browser_version":"","exposure":"","act_user":"","dlp_unique_count":0,"smtp_to":[],"suppression_key":"credit_cards.12.db","external_collaborator_count":0,"file_category":"","collaborated":"","manager":"","mail":"","sub_type":"","app_activity":"","managementID":"","file_path":"","to_storage":"","dlp_mail_parent_id":"","dlp_fingerprint_match":"","retro_scan_name":"","src_geoip_src":0,"userCountry":"","file_password_protected":"","web_universal_connector":"","dlp_fingerprint_score":0,"sanctioned_instance":"","referer":"","parent_id":"","title":"credit_cards.12.db","to_user":"","shared_with":"","dst_geoip_src":0,"object_id":"","from_user":"","shared_domains":"","instance":"","modified":0,"true_filetype":"","dlp_rule_score":0,"dlp_fingerprint_classification":"","violating_user_type":"","local_sha256":"","object":"credit_cards.12.db","owner":"","bcc":""} ::: fileHashType=sha256 ::: clientHostname=Jenga-Surface ::: startTimeUTC=2023-12-20T22:33:33Z ::: streamName=netskope ::: messageType=data_exfiltration ::: serverIP=211.187.88.142 ::: userName=alice ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),Payment Card Industry Data Security Standard. PCI-DSS,INTL-PAN-Name] ::: clientIP=134.239.215.2
{ "clienthostname": "Jenga-Surface", "filehash": "26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f", "message": "WitFoo-Artifact ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f ::: program=Microsoft OneDrive ::: message={\"_id\":\"a533abc31101969f3a41697c\",\"access_method\":\"Client\",\"acked\":\"false\",\"action\":\"alert\",\"activity\":\"Download\",\"alert\":\"yes\",\"alert_name\":\"DLP PCI Alert\",\"alert_type\":\"DLP\",\"app\":\"Microsoft OneDrive\",\"app_session_id\":3483912176895852176,\"appcategory\":\"Cloud Storage\",\"appsuite\":\"Microsoft Live\",\"browser\":\"Native\",\"browser_session_id\":4752751631097491507,\"category\":\"Cloud Storage\",\"ccl\":\"high\",\"connection_id\":2762431970988418783,\"device\":\"Windows Device\",\"device_classification\":\"unmanaged\",\"dlp_incident_id\":4233141258481957646,\"dlp_is_unique_count\":\"false\",\"dlp_parent_id\":4233141258481957646,\"dlp_profile\":\"Payment Card Industry Data Security Standard. PCI-DSS\",\"dlp_rule\":\"INTL-PAN-Name\",\"dlp_rule_count\":14375,\"dlp_rule_severity\":\"Critical\",\"dst_country\":\"US\",\"dst_location\":\"Redmond\",\"dst_region\":\"Washington\",\"dst_timezone\":\"America/Los_Angeles\",\"dst_zipcode\":\"N/A\",\"dstip\":\"211.187.88.142\",\"file_lang\":\"ENGLISH\",\"file_size\":10256549,\"file_type\":\"text/plain\",\"hostname\":\"Jenga-Surface\",\"incident_id\":1523448449225732235,\"managed_app\":\"yes\",\"md5\":\"2f6df9969215d9eb4d266dd636337da7\",\"object_type\":\"File\",\"organization_unit\":\"\",\"os\":\"Windows 11\",\"os_version\":\"Windows 11\",\"outer_doc_type\":0,\"page\":\"ahokbw.sn.files.1drv.com\",\"page_site\":\"Microsoft OneDrive\",\"policy\":\"DLP PCI Alert\",\"policy_id\":\"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367\",\"protocol\":\"HTTPS/1.1\",\"request_id\":2735518334081635584,\"scan_type\":\"\",\"severity\":\"unknown\",\"sha256\":\"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f\",\"site\":\"Microsoft OneDrive\",\"src_country\":\"US\",\"src_location\":\"San Diego\",\"src_region\":\"California\",\"src_time\":\"Wed Dec 20 14:33:08 2023\",\"src_timezone\":\"America/Los_Angeles\",\"src_zipcode\":\"92110\",\"srcip\":\"134.239.215.2\",\"timestamp\":1703111613,\"traffic_type\":\"CloudApp\",\"transaction_id\":1523448449225732235,\"true_obj_category\":\"Text\",\"true_obj_type\":\"Plain Text file\",\"true_type_id\":2,\"tss_mode\":\"inline\",\"type\":\"nspolicy\",\"ur_normalized\":\"alice\",\"url\":\"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k\",\"user\":\"alice\",\"userip\":\"192.168.1.194\",\"userkey\":\"alice\",\"dynamic_classification\":\"\",\"message_size\":0,\"universal_connector\":\"\",\"displayName\":\"\",\"mime_type\":\"\",\"violating_user\":\"\",\"user_id\":\"\",\"file_cls_encrypted\":false,\"sAMAccountName\":\"\",\"channel\":\"\",\"orignal_file_path\":\"\",\"data_type\":\"\",\"classification_name\":\"\",\"userPrincipalName\":\"\",\"from_storage\":\"\",\"owner_pdl\":\"\",\"group\":\"\",\"total_collaborator_count\":0,\"message_id\":\"\",\"dlp_file\":\"credit_cards.12.db\",\"instance_id\":\"\",\"browser_version\":\"\",\"exposure\":\"\",\"act_user\":\"\",\"dlp_unique_count\":0,\"smtp_to\":[],\"suppression_key\":\"credit_cards.12.db\",\"external_collaborator_count\":0,\"file_category\":\"\",\"collaborated\":\"\",\"manager\":\"\",\"mail\":\"\",\"sub_type\":\"\",\"app_activity\":\"\",\"managementID\":\"\",\"file_path\":\"\",\"to_storage\":\"\",\"dlp_mail_parent_id\":\"\",\"dlp_fingerprint_match\":\"\",\"retro_scan_name\":\"\",\"src_geoip_src\":0,\"userCountry\":\"\",\"file_password_protected\":\"\",\"web_universal_connector\":\"\",\"dlp_fingerprint_score\":0,\"sanctioned_instance\":\"\",\"referer\":\"\",\"parent_id\":\"\",\"title\":\"credit_cards.12.db\",\"to_user\":\"\",\"shared_with\":\"\",\"dst_geoip_src\":0,\"object_id\":\"\",\"from_user\":\"\",\"shared_domains\":\"\",\"instance\":\"\",\"modified\":0,\"true_filetype\":\"\",\"dlp_rule_score\":0,\"dlp_fingerprint_classification\":\"\",\"violating_user_type\":\"\",\"local_sha256\":\"\",\"object\":\"credit_cards.12.db\",\"owner\":\"\",\"bcc\":\"\"} ::: fileHashType=sha256 ::: clientHostname=Jenga-Surface ::: startTimeUTC=2023-12-20T22:33:33Z ::: streamName=netskope ::: messageType=data_exfiltration ::: serverIP=211.187.88.142 ::: userName=alice ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),Payment Card Industry Data Security Standard. PCI-DSS,INTL-PAN-Name] ::: clientIP=134.239.215.2", "messagetype": "data_exfiltration", "program": "Microsoft OneDrive", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "starttimeutc": "2023-12-20T22:33:33Z", "tags": [ "data_exfiltration", "netskope", "INTL-PAN-Name", "Payment Card Industry Data Security Standard. PCI-DSS", "Windows Device(unmanaged)", "DLP PCI Alert", "Cloud Storage", "Microsoft OneDrive" ], "streamName": "netskope", "clientIP": "134.239.215.2", "serverIP": "211.187.88.142", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f ::: program=Microsoft OneDrive ::: message={"_id":"a533abc31101969f3a41697c","access_method":"Client","acked":"false","action":"alert","activity":"Download","alert":"yes","alert_name":"DLP PCI Alert","alert_type":"DLP","app":"Microsoft OneDrive","app_session_id":3483912176895852176,"appcategory":"Cloud Storage","appsuite":"Microsoft Live","browser":"Native","browser_session_id":4752751631097491507,"category":"Cloud Storage","ccl":"high","connection_id":2762431970988418783,"device":"Windows Device","device_classification":"unmanaged","dlp_incident_id":4233141258481957646,"dlp_is_unique_count":"false","dlp_parent_id":4233141258481957646,"dlp_profile":"Payment Card Industry Data Security Standard. PCI-DSS","dlp_rule":"INTL-PAN-Name","dlp_rule_count":14375,"dlp_rule_severity":"Critical","dst_country":"US","dst_location":"Redmond","dst_region":"Washington","dst_timezone":"America/Los_Angeles","dst_zipcode":"N/A","dstip":"211.187.88.142","file_lang":"ENGLISH","file_size":10256549,"file_type":"text/plain","hostname":"Jenga-Surface","incident_id":1523448449225732235,"managed_app":"yes","md5":"2f6df9969215d9eb4d266dd636337da7","object_type":"File","organization_unit":"","os":"Windows 11","os_version":"Windows 11","outer_doc_type":0,"page":"ahokbw.sn.files.1drv.com","page_site":"Microsoft OneDrive","policy":"DLP PCI Alert","policy_id":"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367","protocol":"HTTPS/1.1","request_id":2735518334081635584,"scan_type":"","severity":"unknown","sha256":"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f","site":"Microsoft OneDrive","src_country":"US","src_location":"San Diego","src_region":"California","src_time":"Wed Dec 20 14:33:08 2023","src_timezone":"America/Los_Angeles","src_zipcode":"92110","srcip":"134.239.215.2","timestamp":1703111613,"traffic_type":"CloudApp","transaction_id":1523448449225732235,"true_obj_category":"Text","true_obj_type":"Plain Text file","true_type_id":2,"tss_mode":"inline","type":"nspolicy","ur_normalized":"alice","url":"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k","user":"alice","userip":"192.168.1.194","userkey":"alice","dynamic_classification":"","message_size":0,"universal_connector":"","displayName":"","mime_type":"","violating_user":"","user_id":"","file_cls_encrypted":false,"sAMAccountName":"","channel":"","orignal_file_path":"","data_type":"","classification_name":"","userPrincipalName":"","from_storage":"","owner_pdl":"","group":"","total_collaborator_count":0,"message_id":"","dlp_file":"credit_cards.12.db","instance_id":"","browser_version":"","exposure":"","act_user":"","dlp_unique_count":0,"smtp_to":[],"suppression_key":"credit_cards.12.db","external_collaborator_count":0,"file_category":"","collaborated":"","manager":"","mail":"","sub_type":"","app_activity":"","managementID":"","file_path":"","to_storage":"","dlp_mail_parent_id":"","dlp_fingerprint_match":"","retro_scan_name":"","src_geoip_src":0,"userCountry":"","file_password_protected":"","web_universal_connector":"","dlp_fingerprint_score":0,"sanctioned_instance":"","referer":"","parent_id":"","title":"credit_cards.12.db","to_user":"","shared_with":"","dst_geoip_src":0,"object_id":"","from_user":"","shared_domains":"","instance":"","modified":0,"true_filetype":"","dlp_rule_score":0,"dlp_fingerprint_classification":"","violating_user_type":"","local_sha256":"","object":"credit_cards.12.db","owner":"","bcc":""} ::: fileHashType=sha256 ::: clientHostname=Jenga-Surface ::: startTimeUTC=2023-12-20T22:33:33Z ::: streamName=netskope ::: messageType=data_exfiltration ::: serverIP=211.187.88.142 ::: userName=alice ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),Payment Card Industry Data Security Standard. PCI-DSS,INTL-PAN-Name] ::: clientIP=134.239.215.2
Product: Netskope Vendor: Netskope
Identify this syslog message
WitFoo-Artifact ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f ::: program=Microsoft OneDrive ::: message={"_id":"a533abc31101969f3a41697c","access_method":"Client","acked":"false","action":"alert","activity":"Download","alert":"yes","alert_name":"DLP PCI Alert","alert_type":"DLP","app":"Microsoft OneDrive","app_session_id":3483912176895852176,"appcategory":"Cloud Storage","appsuite":"Microsoft Live","browser":"Native","browser_session_id":4752751631097491507,"category":"Cloud Storage","ccl":"high","connection_id":2762431970988418783,"device":"Windows Device","device_classification":"unmanaged","dlp_incident_id":4233141258481957646,"dlp_is_unique_count":"false","dlp_parent_id":4233141258481957646,"dlp_profile":"Payment Card Industry Data Security Standard. PCI-DSS","dlp_rule":"INTL-PAN-Name","dlp_rule_count":14375,"dlp_rule_severity":"Critical","dst_country":"US","dst_location":"Redmond","dst_region":"Washington","dst_timezone":"America/Los_Angeles","dst_zipcode":"N/A","dstip":"211.187.88.142","file_lang":"ENGLISH","file_size":10256549,"file_type":"text/plain","hostname":"Jenga-Surface","incident_id":1523448449225732235,"managed_app":"yes","md5":"2f6df9969215d9eb4d266dd636337da7","object_type":"File","organization_unit":"","os":"Windows 11","os_version":"Windows 11","outer_doc_type":0,"page":"ahokbw.sn.files.1drv.com","page_site":"Microsoft OneDrive","policy":"DLP PCI Alert","policy_id":"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367","protocol":"HTTPS/1.1","request_id":2735518334081635584,"scan_type":"","severity":"unknown","sha256":"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f","site":"Microsoft OneDrive","src_country":"US","src_location":"San Diego","src_region":"California","src_time":"Wed Dec 20 14:33:08 2023","src_timezone":"America/Los_Angeles","src_zipcode":"92110","srcip":"134.239.215.2","timestamp":1703111613,"traffic_type":"CloudApp","transaction_id":1523448449225732235,"true_obj_category":"Text","true_obj_type":"Plain Text file","true_type_id":2,"tss_mode":"inline","type":"nspolicy","ur_normalized":"alice","url":"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k","user":"alice","userip":"192.168.1.194","userkey":"alice","dynamic_classification":"","message_size":0,"universal_connector":"","displayName":"","mime_type":"","violating_user":"","user_id":"","file_cls_encrypted":false,"sAMAccountName":"","channel":"","orignal_file_path":"","data_type":"","classification_name":"","userPrincipalName":"","from_storage":"","owner_pdl":"","group":"","total_collaborator_count":0,"message_id":"","dlp_file":"credit_cards.12.db","instance_id":"","browser_version":"","exposure":"","act_user":"","dlp_unique_count":0,"smtp_to":[],"suppression_key":"credit_cards.12.db","external_collaborator_count":0,"file_category":"","collaborated":"","manager":"","mail":"","sub_type":"","app_activity":"","managementID":"","file_path":"","to_storage":"","dlp_mail_parent_id":"","dlp_fingerprint_match":"","retro_scan_name":"","src_geoip_src":0,"userCountry":"","file_password_protected":"","web_universal_connector":"","dlp_fingerprint_score":0,"sanctioned_instance":"","referer":"","parent_id":"","title":"credit_cards.12.db","to_user":"","shared_with":"","dst_geoip_src":0,"object_id":"","from_user":"","shared_domains":"","instance":"","modified":0,"true_filetype":"","dlp_rule_score":0,"dlp_fingerprint_classification":"","violating_user_type":"","local_sha256":"","object":"credit_cards.12.db","owner":"","bcc":""} ::: fileHashType=sha256 ::: clientHostname=Jenga-Surface ::: startTimeUTC=2023-12-20T22:33:33Z ::: streamName=netskope ::: messageType=data_exfiltration ::: serverIP=211.187.88.142 ::: userName=alice ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),Payment Card Industry Data Security Standard. PCI-DSS,INTL-PAN-Name] ::: clientIP=134.239.215.2
This is a syslog message from a product called Netskope by Netskope. The following fields were extracted from the message: clienthostname: Jenga-Surface filehash: 26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f messagetype: data_exfiltration program: Microsoft OneDrive senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown starttimeutc: 2023-12-20T22:33:33Z tags: ['data_exfiltration', 'netskope', 'INTL-PAN-Name', 'Payment Card Industry Data Security Standard. PCI-DSS', 'Windows Device(unmanaged)', 'DLP PCI Alert', 'Cloud Storage', 'Microsoft OneDrive'] streamName: netskope clientIP: 134.239.215.2 serverIP: 211.187.88.142 userName: alice
Explain this syslog message
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=98.223.177.43 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=42.195.62.149 dst=98.223.177.43 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1552 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
{ "senderhost": "34.205.5.2", "serverport": 443, "severitylabel": "emergency", "tags": [ "TCP Flags:ACK PSH", "DPI Note:CVE-2010-2730", "trend micro_deep security agent_Request Header Buffer Overflow Vulnerability", "rfc3164", "Fragmentation Bits:DF 0", "cef", "DPI Flags:0", "Request Header Buffer Overflow Vulnerability", "trend micro_deep security agent", "DPI Stream Position :0" ], "productids": [ 30 ], "sourceinfo": "unknown", "message": "<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=98.223.177.43 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=42.195.62.149 dst=98.223.177.43 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1552 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2010-2730\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags", "localstarttime": "Oct 5 16:46:37", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Request Header Buffer Overflow Vulnerability", "servermac": "0ABBAEEE7AE1", "clientmac": "0A5FBF1DBD89", "clientport": 1710, "vendorcode": "1004398", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "streamName": "trend micro_deep security agent", "clientIP": "42.195.62.149", "serverIP": "98.223.177.43" }
Create a JSON artifact from the message
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=98.223.177.43 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=42.195.62.149 dst=98.223.177.43 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1552 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=98.223.177.43 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=42.195.62.149 dst=98.223.177.43 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1552 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.2 serverport: 443 severitylabel: emergency tags: ['TCP Flags:ACK PSH', 'DPI Note:CVE-2010-2730', 'trend micro_deep security agent_Request Header Buffer Overflow Vulnerability', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'Request Header Buffer Overflow Vulnerability', 'trend micro_deep security agent', 'DPI Stream Position :0'] productids: [30] sourceinfo: unknown localstarttime: Oct 5 16:46:37 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Request Header Buffer Overflow Vulnerability servermac: 0ABBAEEE7AE1 clientmac: 0A5FBF1DBD89 clientport: 1710 vendorcode: 1004398 action: IDS:Reset protocol: 6 facilitycode: 16 streamName: trend micro_deep security agent clientIP: 42.195.62.149 serverIP: 98.223.177.43
Explain this syslog message
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=233.25.222.169 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=111.153.140.74 dst=233.25.222.169 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=402 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
{ "senderhost": "34.205.5.2", "serverport": 443, "severitylabel": "emergency", "tags": [ "TCP Flags:ACK PSH", "trend micro_deep security agent_Request Header Buffer Overflow Vulnerability", "DPI Note:CVE-2010-2730-1", "rfc3164", "Fragmentation Bits:DF 0", "cef", "DPI Flags:0", "Request Header Buffer Overflow Vulnerability", "trend micro_deep security agent", "DPI Stream Position :0" ], "productids": [ 30 ], "sourceinfo": "unknown", "message": "<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=233.25.222.169 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=111.153.140.74 dst=233.25.222.169 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=402 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2010-2730-1\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags", "localstarttime": "Oct 5 16:51:55", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Request Header Buffer Overflow Vulnerability", "servermac": "0ABBAEEE7AE1", "clientmac": "0A5FBF1DBD89", "clientport": 1538, "vendorcode": "1004398", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "streamName": "trend micro_deep security agent", "clientIP": "111.153.140.74", "serverIP": "233.25.222.169" }
Create a JSON artifact from the message
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=233.25.222.169 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=111.153.140.74 dst=233.25.222.169 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=402 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=233.25.222.169 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=111.153.140.74 dst=233.25.222.169 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=402 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.2 serverport: 443 severitylabel: emergency tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Request Header Buffer Overflow Vulnerability', 'DPI Note:CVE-2010-2730-1', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'Request Header Buffer Overflow Vulnerability', 'trend micro_deep security agent', 'DPI Stream Position :0'] productids: [30] sourceinfo: unknown localstarttime: Oct 5 16:51:55 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Request Header Buffer Overflow Vulnerability servermac: 0ABBAEEE7AE1 clientmac: 0A5FBF1DBD89 clientport: 1538 vendorcode: 1004398 action: IDS:Reset protocol: 6 facilitycode: 16 streamName: trend micro_deep security agent clientIP: 111.153.140.74 serverIP: 233.25.222.169
Explain this syslog message
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=101.20.31.120 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=16.39.150.35 dst=101.20.31.120 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=621 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
{ "senderhost": "34.205.5.2", "serverport": 443, "severitylabel": "emergency", "tags": [ "TCP Flags:ACK PSH", "trend micro_deep security agent_Request Header Buffer Overflow Vulnerability", "DPI Note:CVE-2010-2730-1", "rfc3164", "Fragmentation Bits:DF 0", "cef", "DPI Flags:0", "Request Header Buffer Overflow Vulnerability", "trend micro_deep security agent", "DPI Stream Position :0" ], "productids": [ 30 ], "sourceinfo": "unknown", "message": "<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=101.20.31.120 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=16.39.150.35 dst=101.20.31.120 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=621 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2010-2730-1\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags", "localstarttime": "Oct 5 16:46:37", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Request Header Buffer Overflow Vulnerability", "servermac": "0ABBAEEE7AE1", "clientmac": "0A5FBF1DBD89", "clientport": 1710, "vendorcode": "1004398", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "streamName": "trend micro_deep security agent", "clientIP": "16.39.150.35", "serverIP": "101.20.31.120" }
Create a JSON artifact from the message
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=101.20.31.120 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=16.39.150.35 dst=101.20.31.120 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=621 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=101.20.31.120 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=16.39.150.35 dst=101.20.31.120 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=621 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.2 serverport: 443 severitylabel: emergency tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Request Header Buffer Overflow Vulnerability', 'DPI Note:CVE-2010-2730-1', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'Request Header Buffer Overflow Vulnerability', 'trend micro_deep security agent', 'DPI Stream Position :0'] productids: [30] sourceinfo: unknown localstarttime: Oct 5 16:46:37 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Request Header Buffer Overflow Vulnerability servermac: 0ABBAEEE7AE1 clientmac: 0A5FBF1DBD89 clientport: 1710 vendorcode: 1004398 action: IDS:Reset protocol: 6 facilitycode: 16 streamName: trend micro_deep security agent clientIP: 16.39.150.35 serverIP: 101.20.31.120
Explain this syslog message
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=121.220.226.166 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=13.25.238.205 dst=121.220.226.166 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1119 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
{ "senderhost": "34.205.5.2", "serverport": 443, "severitylabel": "emergency", "tags": [ "TCP Flags:ACK PSH", "DPI Note:CVE-2010-2730", "trend micro_deep security agent_Request Header Buffer Overflow Vulnerability", "rfc3164", "Fragmentation Bits:DF 0", "cef", "DPI Flags:0", "Request Header Buffer Overflow Vulnerability", "trend micro_deep security agent", "DPI Stream Position :0" ], "productids": [ 30 ], "sourceinfo": "unknown", "message": "<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=121.220.226.166 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=13.25.238.205 dst=121.220.226.166 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1119 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2010-2730\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags", "localstarttime": "Oct 5 16:51:55", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Request Header Buffer Overflow Vulnerability", "servermac": "0ABBAEEE7AE1", "clientmac": "0A5FBF1DBD89", "clientport": 1538, "vendorcode": "1004398", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "streamName": "trend micro_deep security agent", "clientIP": "13.25.238.205", "serverIP": "121.220.226.166" }
Create a JSON artifact from the message
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=121.220.226.166 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=13.25.238.205 dst=121.220.226.166 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1119 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=121.220.226.166 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=13.25.238.205 dst=121.220.226.166 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1119 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.2 serverport: 443 severitylabel: emergency tags: ['TCP Flags:ACK PSH', 'DPI Note:CVE-2010-2730', 'trend micro_deep security agent_Request Header Buffer Overflow Vulnerability', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'Request Header Buffer Overflow Vulnerability', 'trend micro_deep security agent', 'DPI Stream Position :0'] productids: [30] sourceinfo: unknown localstarttime: Oct 5 16:51:55 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Request Header Buffer Overflow Vulnerability servermac: 0ABBAEEE7AE1 clientmac: 0A5FBF1DBD89 clientport: 1538 vendorcode: 1004398 action: IDS:Reset protocol: 6 facilitycode: 16 streamName: trend micro_deep security agent clientIP: 13.25.238.205 serverIP: 121.220.226.166
Explain this syslog message
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=47.189.165.200 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=196.68.60.174 dst=47.189.165.200 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1552 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
{ "senderhost": "34.205.5.2", "serverport": 443, "severitylabel": "emergency", "tags": [ "TCP Flags:ACK PSH", "DPI Note:CVE-2010-2730", "trend micro_deep security agent_Request Header Buffer Overflow Vulnerability", "rfc3164", "Fragmentation Bits:DF 0", "cef", "DPI Flags:0", "Request Header Buffer Overflow Vulnerability", "trend micro_deep security agent", "DPI Stream Position :0" ], "productids": [ 30 ], "sourceinfo": "unknown", "message": "<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=47.189.165.200 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=196.68.60.174 dst=47.189.165.200 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1552 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2010-2730\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags", "localstarttime": "Oct 5 16:46:37", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Request Header Buffer Overflow Vulnerability", "servermac": "0ABBAEEE7AE1", "clientmac": "0A5FBF1DBD89", "clientport": 1710, "vendorcode": "1004398", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "streamName": "trend micro_deep security agent", "clientIP": "196.68.60.174", "serverIP": "47.189.165.200" }
Create a JSON artifact from the message
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=47.189.165.200 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=196.68.60.174 dst=47.189.165.200 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1552 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=47.189.165.200 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=196.68.60.174 dst=47.189.165.200 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1552 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.2 serverport: 443 severitylabel: emergency tags: ['TCP Flags:ACK PSH', 'DPI Note:CVE-2010-2730', 'trend micro_deep security agent_Request Header Buffer Overflow Vulnerability', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'Request Header Buffer Overflow Vulnerability', 'trend micro_deep security agent', 'DPI Stream Position :0'] productids: [30] sourceinfo: unknown localstarttime: Oct 5 16:46:37 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Request Header Buffer Overflow Vulnerability servermac: 0ABBAEEE7AE1 clientmac: 0A5FBF1DBD89 clientport: 1710 vendorcode: 1004398 action: IDS:Reset protocol: 6 facilitycode: 16 streamName: trend micro_deep security agent clientIP: 196.68.60.174 serverIP: 47.189.165.200
Explain this syslog message
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=191.33.4.216 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=201.167.94.16 dst=191.33.4.216 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=402 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
{ "senderhost": "34.205.5.2", "serverport": 443, "severitylabel": "emergency", "tags": [ "TCP Flags:ACK PSH", "trend micro_deep security agent_Request Header Buffer Overflow Vulnerability", "DPI Note:CVE-2010-2730-1", "rfc3164", "Fragmentation Bits:DF 0", "cef", "DPI Flags:0", "Request Header Buffer Overflow Vulnerability", "trend micro_deep security agent", "DPI Stream Position :0" ], "productids": [ 30 ], "sourceinfo": "unknown", "message": "<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=191.33.4.216 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=201.167.94.16 dst=191.33.4.216 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=402 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2010-2730-1\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags", "localstarttime": "Oct 5 16:51:55", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Request Header Buffer Overflow Vulnerability", "servermac": "0ABBAEEE7AE1", "clientmac": "0A5FBF1DBD89", "clientport": 1538, "vendorcode": "1004398", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "streamName": "trend micro_deep security agent", "clientIP": "201.167.94.16", "serverIP": "191.33.4.216" }
Create a JSON artifact from the message
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=191.33.4.216 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=201.167.94.16 dst=191.33.4.216 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=402 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=191.33.4.216 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=201.167.94.16 dst=191.33.4.216 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=402 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.2 serverport: 443 severitylabel: emergency tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Request Header Buffer Overflow Vulnerability', 'DPI Note:CVE-2010-2730-1', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'Request Header Buffer Overflow Vulnerability', 'trend micro_deep security agent', 'DPI Stream Position :0'] productids: [30] sourceinfo: unknown localstarttime: Oct 5 16:51:55 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Request Header Buffer Overflow Vulnerability servermac: 0ABBAEEE7AE1 clientmac: 0A5FBF1DBD89 clientport: 1538 vendorcode: 1004398 action: IDS:Reset protocol: 6 facilitycode: 16 streamName: trend micro_deep security agent clientIP: 201.167.94.16 serverIP: 191.33.4.216
Explain this syslog message
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=63.158.154.31 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=87.19.236.5 dst=63.158.154.31 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=621 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
{ "senderhost": "34.205.5.2", "serverport": 443, "severitylabel": "emergency", "tags": [ "TCP Flags:ACK PSH", "trend micro_deep security agent_Request Header Buffer Overflow Vulnerability", "DPI Note:CVE-2010-2730-1", "rfc3164", "Fragmentation Bits:DF 0", "cef", "DPI Flags:0", "Request Header Buffer Overflow Vulnerability", "trend micro_deep security agent", "DPI Stream Position :0" ], "productids": [ 30 ], "sourceinfo": "unknown", "message": "<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=63.158.154.31 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=87.19.236.5 dst=63.158.154.31 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=621 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2010-2730-1\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags", "localstarttime": "Oct 5 16:46:37", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Request Header Buffer Overflow Vulnerability", "servermac": "0ABBAEEE7AE1", "clientmac": "0A5FBF1DBD89", "clientport": 1710, "vendorcode": "1004398", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "streamName": "trend micro_deep security agent", "clientIP": "87.19.236.5", "serverIP": "63.158.154.31" }
Create a JSON artifact from the message
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=63.158.154.31 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=87.19.236.5 dst=63.158.154.31 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=621 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=63.158.154.31 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=87.19.236.5 dst=63.158.154.31 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=621 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.2 serverport: 443 severitylabel: emergency tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Request Header Buffer Overflow Vulnerability', 'DPI Note:CVE-2010-2730-1', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'Request Header Buffer Overflow Vulnerability', 'trend micro_deep security agent', 'DPI Stream Position :0'] productids: [30] sourceinfo: unknown localstarttime: Oct 5 16:46:37 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Request Header Buffer Overflow Vulnerability servermac: 0ABBAEEE7AE1 clientmac: 0A5FBF1DBD89 clientport: 1710 vendorcode: 1004398 action: IDS:Reset protocol: 6 facilitycode: 16 streamName: trend micro_deep security agent clientIP: 87.19.236.5 serverIP: 63.158.154.31
Explain this syslog message
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=123.103.118.190 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=53.192.39.62 dst=123.103.118.190 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1119 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
{ "senderhost": "34.205.5.2", "serverport": 443, "severitylabel": "emergency", "tags": [ "TCP Flags:ACK PSH", "DPI Note:CVE-2010-2730", "trend micro_deep security agent_Request Header Buffer Overflow Vulnerability", "rfc3164", "Fragmentation Bits:DF 0", "cef", "DPI Flags:0", "Request Header Buffer Overflow Vulnerability", "trend micro_deep security agent", "DPI Stream Position :0" ], "productids": [ 30 ], "sourceinfo": "unknown", "message": "<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=123.103.118.190 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=53.192.39.62 dst=123.103.118.190 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1119 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2010-2730\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags", "localstarttime": "Oct 5 16:51:55", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Request Header Buffer Overflow Vulnerability", "servermac": "0ABBAEEE7AE1", "clientmac": "0A5FBF1DBD89", "clientport": 1538, "vendorcode": "1004398", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "streamName": "trend micro_deep security agent", "clientIP": "53.192.39.62", "serverIP": "123.103.118.190" }
Create a JSON artifact from the message
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=123.103.118.190 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=53.192.39.62 dst=123.103.118.190 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1119 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=123.103.118.190 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=53.192.39.62 dst=123.103.118.190 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1119 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.2 serverport: 443 severitylabel: emergency tags: ['TCP Flags:ACK PSH', 'DPI Note:CVE-2010-2730', 'trend micro_deep security agent_Request Header Buffer Overflow Vulnerability', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'Request Header Buffer Overflow Vulnerability', 'trend micro_deep security agent', 'DPI Stream Position :0'] productids: [30] sourceinfo: unknown localstarttime: Oct 5 16:51:55 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Request Header Buffer Overflow Vulnerability servermac: 0ABBAEEE7AE1 clientmac: 0A5FBF1DBD89 clientport: 1538 vendorcode: 1004398 action: IDS:Reset protocol: 6 facilitycode: 16 streamName: trend micro_deep security agent clientIP: 53.192.39.62 serverIP: 123.103.118.190
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=209.198.200.228 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"150.145.104.31","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"209.198.200.228","location":{"city":"Pestarktree Corners","country":"United States","state":"Georgia"},"name":"678-768-5994"},"email":"charlie@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-27T12:10:29.538097+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661602229,"txid":"70ae84fa-2277-4131-ae6f-ebabcfba7a7a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUWS81USLCNBRNQC3W9Y","name":"charlie"}} ::: program=null ::: clientIP=150.145.104.31 ::: userName=charlie ::: created_at=1661602229 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661602229 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1661602229", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "209.198.200.228", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS02", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=209.198.200.228 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"150.145.104.31\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"209.198.200.228\",\"location\":{\"city\":\"Pestarktree Corners\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"678-768-5994\"},\"email\":\"charlie@stark.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-27T12:10:29.538097+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1661602229,\"txid\":\"70ae84fa-2277-4131-ae6f-ebabcfba7a7a\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUWS81USLCNBRNQC3W9Y\",\"name\":\"charlie\"}} ::: program=null ::: clientIP=150.145.104.31 ::: userName=charlie ::: created_at=1661602229 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661602229 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "150.145.104.31", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=209.198.200.228 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"150.145.104.31","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"209.198.200.228","location":{"city":"Pestarktree Corners","country":"United States","state":"Georgia"},"name":"678-768-5994"},"email":"charlie@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-27T12:10:29.538097+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661602229,"txid":"70ae84fa-2277-4131-ae6f-ebabcfba7a7a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUWS81USLCNBRNQC3W9Y","name":"charlie"}} ::: program=null ::: clientIP=150.145.104.31 ::: userName=charlie ::: created_at=1661602229 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661602229 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=209.198.200.228 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"150.145.104.31","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"209.198.200.228","location":{"city":"Pestarktree Corners","country":"United States","state":"Georgia"},"name":"678-768-5994"},"email":"charlie@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-27T12:10:29.538097+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661602229,"txid":"70ae84fa-2277-4131-ae6f-ebabcfba7a7a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUWS81USLCNBRNQC3W9Y","name":"charlie"}} ::: program=null ::: clientIP=150.145.104.31 ::: userName=charlie ::: created_at=1661602229 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661602229 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1661602229 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 209.198.200.228 sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS02 streamName: DUO clientIP: 150.145.104.31 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=209.198.200.228 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"77.109.152.118","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"209.198.200.228","location":{"city":"Peoscorptree Corners","country":"United States","state":"Georgia"},"name":"678-768-5994"},"email":"charlie@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-27T12:10:29.538097+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661602229,"txid":"70ae84fa-2277-4131-ae6f-ebabcfba7a7a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUWS81USLCNBRNQC3W9Y","name":"charlie"}} ::: program=null ::: clientIP=77.109.152.118 ::: userName=charlie ::: created_at=1661602229 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661602229 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1661602229", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "209.198.200.228", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS02", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=209.198.200.228 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"77.109.152.118\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"209.198.200.228\",\"location\":{\"city\":\"Peoscorptree Corners\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"678-768-5994\"},\"email\":\"charlie@oscorp.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-27T12:10:29.538097+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1661602229,\"txid\":\"70ae84fa-2277-4131-ae6f-ebabcfba7a7a\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUWS81USLCNBRNQC3W9Y\",\"name\":\"charlie\"}} ::: program=null ::: clientIP=77.109.152.118 ::: userName=charlie ::: created_at=1661602229 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661602229 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "77.109.152.118", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=209.198.200.228 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"77.109.152.118","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"209.198.200.228","location":{"city":"Peoscorptree Corners","country":"United States","state":"Georgia"},"name":"678-768-5994"},"email":"charlie@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-27T12:10:29.538097+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661602229,"txid":"70ae84fa-2277-4131-ae6f-ebabcfba7a7a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUWS81USLCNBRNQC3W9Y","name":"charlie"}} ::: program=null ::: clientIP=77.109.152.118 ::: userName=charlie ::: created_at=1661602229 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661602229 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=209.198.200.228 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"77.109.152.118","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"209.198.200.228","location":{"city":"Peoscorptree Corners","country":"United States","state":"Georgia"},"name":"678-768-5994"},"email":"charlie@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-27T12:10:29.538097+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661602229,"txid":"70ae84fa-2277-4131-ae6f-ebabcfba7a7a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUWS81USLCNBRNQC3W9Y","name":"charlie"}} ::: program=null ::: clientIP=77.109.152.118 ::: userName=charlie ::: created_at=1661602229 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661602229 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1661602229 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 209.198.200.228 sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS02 streamName: DUO clientIP: 77.109.152.118 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"46.97.31.73","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGACMECME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGACMECME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"46.97.31.73","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=46.97.31.73 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
{ "action": "FAILURE", "georegion": "United States", "message": "WitFoo-Artifact ::: tags=[\"description=Authenticate user with AD agent\",\"userDisplay=undefined | undefined\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u176suj2KgPRj9K697\",\"status\":\"ACTIVE\",\"created\":\"2022-05-27T15:49:21.000Z\",\"activated\":\"2022-05-27T15:49:22.000Z\",\"statusChanged\":\"2023-05-03T17:47:47.000Z\",\"lastLogin\":\"2023-05-18T17:12:00.000Z\",\"lastUpdated\":\"2023-05-18T23:25:08.000Z\",\"passwordChanged\":\"2023-05-03T17:47:47.000Z\",\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"IT\",\"lastName\":\"Support\",\"mobilePhone\":null,\"secondEmail\":\"\",\"login\":\"fish\",\"email\":\"fish\"},\"credentials\":{\"password\":{},\"provider\":{\"type\":\"OKTA\",\"name\":\"OKTA\"}},\"_links\":{\"suspend\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697\"},\"resetFactors\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u176suj2KgPRj9K697\",\"type\":\"User\",\"alternateId\":\"fish\",\"displayName\":\"IT Support\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)\",\"os\":\"Windows 8\",\"browser\":\"UNKNOWN\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":\"cappT0Hfy97F1BoO1UTR\",\"ipAddress\":\"46.97.31.73\",\"geographicalContext\":{\"city\":\"Santa Ana\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92704\",\"geolocation\":{\"lat\":33.7256,\"lon\":-117.9119}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":\"ACTIVE_DIRECTORY\",\"credentialProvider\":null,\"credentialType\":\"PASSWORD\",\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"trsq3WGy8SeSeaoSRiohJxtow\"},\"displayMessage\":\"Authenticate user with AD agent\",\"eventType\":\"user.authentication.auth_via_AD_agent\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"Login Failed\"},\"published\":\"2023-10-03T15:44:17.600Z\",\"securityContext\":{\"asNumber\":3561,\"asOrg\":\"san diego private bank\",\"isp\":\"centurylink communications llc\",\"domain\":\"merituspayment.com\",\"isProxy\":false},\"severity\":\"ERROR\",\"debugContext\":{\"debugData\":{\"requestId\":\"ZRw20WgxbdCcsPJ2V1qIGACMECME\",\"dtHash\":\"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f\",\"requestUri\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult\",\"url\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5\"}},\"legacyEventType\":\"app.ad.agent.user_auth.error\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZRw20WgxbdCcsPJ2V1qIGACMECME\",\"detail\":{\"requestApiTokenId\":\"00Tb3jwyxdZ9wzFyO696\"}},\"uuid\":\"b62eac19-6203-11ee-a5be-01e9b0dd7093\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"46.97.31.73\",\"geographicalContext\":{\"city\":\"Santa Ana\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92704\",\"geolocation\":{\"lat\":33.7256,\"lon\":-117.9119}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa16yxhp6iUzuI2b697\",\"type\":\"AppInstance\",\"alternateId\":\"SDPB.LOCAL\",\"displayName\":\"Active Directory\",\"detailEntry\":null}]}} ::: program=UNKNOWN ::: clientIP=46.97.31.73 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "UNKNOWN", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "tags": [ "userDisplay=undefined | undefined", "reason=WitFoo.Switch(FAILURE)", "Okta", "description=Authenticate user with AD agent", "auth_failure" ], "vendorcode": "user.authentication.auth_via_AD_agent", "streamName": "Okta", "clientIP": "46.97.31.73", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"46.97.31.73","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGACMECME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGACMECME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"46.97.31.73","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=46.97.31.73 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
Product: Okta Vendor: Okta
Identify this syslog message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"46.97.31.73","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGACMECME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGACMECME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"46.97.31.73","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=46.97.31.73 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message: action: FAILURE georegion: United States messagetype: auth_failure productids: [6] program: UNKNOWN senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown tags: ['userDisplay=undefined | undefined', 'reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=Authenticate user with AD agent', 'auth_failure'] vendorcode: user.authentication.auth_via_AD_agent streamName: Okta clientIP: 46.97.31.73 userName: fish
Explain this syslog message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"32.158.25.206","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGOSCORPCME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGOSCORPCME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"32.158.25.206","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=32.158.25.206 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
{ "action": "FAILURE", "georegion": "United States", "message": "WitFoo-Artifact ::: tags=[\"description=Authenticate user with AD agent\",\"userDisplay=undefined | undefined\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u176suj2KgPRj9K697\",\"status\":\"ACTIVE\",\"created\":\"2022-05-27T15:49:21.000Z\",\"activated\":\"2022-05-27T15:49:22.000Z\",\"statusChanged\":\"2023-05-03T17:47:47.000Z\",\"lastLogin\":\"2023-05-18T17:12:00.000Z\",\"lastUpdated\":\"2023-05-18T23:25:08.000Z\",\"passwordChanged\":\"2023-05-03T17:47:47.000Z\",\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"IT\",\"lastName\":\"Support\",\"mobilePhone\":null,\"secondEmail\":\"\",\"login\":\"fish\",\"email\":\"fish\"},\"credentials\":{\"password\":{},\"provider\":{\"type\":\"OKTA\",\"name\":\"OKTA\"}},\"_links\":{\"suspend\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697\"},\"resetFactors\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u176suj2KgPRj9K697\",\"type\":\"User\",\"alternateId\":\"fish\",\"displayName\":\"IT Support\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)\",\"os\":\"Windows 8\",\"browser\":\"UNKNOWN\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":\"cappT0Hfy97F1BoO1UTR\",\"ipAddress\":\"32.158.25.206\",\"geographicalContext\":{\"city\":\"Santa Ana\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92704\",\"geolocation\":{\"lat\":33.7256,\"lon\":-117.9119}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":\"ACTIVE_DIRECTORY\",\"credentialProvider\":null,\"credentialType\":\"PASSWORD\",\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"trsq3WGy8SeSeaoSRiohJxtow\"},\"displayMessage\":\"Authenticate user with AD agent\",\"eventType\":\"user.authentication.auth_via_AD_agent\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"Login Failed\"},\"published\":\"2023-10-03T15:44:17.600Z\",\"securityContext\":{\"asNumber\":3561,\"asOrg\":\"san diego private bank\",\"isp\":\"centurylink communications llc\",\"domain\":\"merituspayment.com\",\"isProxy\":false},\"severity\":\"ERROR\",\"debugContext\":{\"debugData\":{\"requestId\":\"ZRw20WgxbdCcsPJ2V1qIGOSCORPCME\",\"dtHash\":\"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f\",\"requestUri\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult\",\"url\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5\"}},\"legacyEventType\":\"app.ad.agent.user_auth.error\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZRw20WgxbdCcsPJ2V1qIGOSCORPCME\",\"detail\":{\"requestApiTokenId\":\"00Tb3jwyxdZ9wzFyO696\"}},\"uuid\":\"b62eac19-6203-11ee-a5be-01e9b0dd7093\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"32.158.25.206\",\"geographicalContext\":{\"city\":\"Santa Ana\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92704\",\"geolocation\":{\"lat\":33.7256,\"lon\":-117.9119}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa16yxhp6iUzuI2b697\",\"type\":\"AppInstance\",\"alternateId\":\"SDPB.LOCAL\",\"displayName\":\"Active Directory\",\"detailEntry\":null}]}} ::: program=UNKNOWN ::: clientIP=32.158.25.206 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "UNKNOWN", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "tags": [ "userDisplay=undefined | undefined", "reason=WitFoo.Switch(FAILURE)", "Okta", "description=Authenticate user with AD agent", "auth_failure" ], "vendorcode": "user.authentication.auth_via_AD_agent", "streamName": "Okta", "clientIP": "32.158.25.206", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"32.158.25.206","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGOSCORPCME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGOSCORPCME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"32.158.25.206","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=32.158.25.206 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
Product: Okta Vendor: Okta
Identify this syslog message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"32.158.25.206","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGOSCORPCME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGOSCORPCME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"32.158.25.206","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=32.158.25.206 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message: action: FAILURE georegion: United States messagetype: auth_failure productids: [6] program: UNKNOWN senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown tags: ['userDisplay=undefined | undefined', 'reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=Authenticate user with AD agent', 'auth_failure'] vendorcode: user.authentication.auth_via_AD_agent streamName: Okta clientIP: 32.158.25.206 userName: fish
Explain this syslog message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"47.237.191.34","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGUMBRELLACME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGUMBRELLACME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"47.237.191.34","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=47.237.191.34 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
{ "action": "FAILURE", "georegion": "United States", "message": "WitFoo-Artifact ::: tags=[\"description=Authenticate user with AD agent\",\"userDisplay=undefined | undefined\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u176suj2KgPRj9K697\",\"status\":\"ACTIVE\",\"created\":\"2022-05-27T15:49:21.000Z\",\"activated\":\"2022-05-27T15:49:22.000Z\",\"statusChanged\":\"2023-05-03T17:47:47.000Z\",\"lastLogin\":\"2023-05-18T17:12:00.000Z\",\"lastUpdated\":\"2023-05-18T23:25:08.000Z\",\"passwordChanged\":\"2023-05-03T17:47:47.000Z\",\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"IT\",\"lastName\":\"Support\",\"mobilePhone\":null,\"secondEmail\":\"\",\"login\":\"fish\",\"email\":\"fish\"},\"credentials\":{\"password\":{},\"provider\":{\"type\":\"OKTA\",\"name\":\"OKTA\"}},\"_links\":{\"suspend\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697\"},\"resetFactors\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u176suj2KgPRj9K697\",\"type\":\"User\",\"alternateId\":\"fish\",\"displayName\":\"IT Support\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)\",\"os\":\"Windows 8\",\"browser\":\"UNKNOWN\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":\"cappT0Hfy97F1BoO1UTR\",\"ipAddress\":\"47.237.191.34\",\"geographicalContext\":{\"city\":\"Santa Ana\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92704\",\"geolocation\":{\"lat\":33.7256,\"lon\":-117.9119}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":\"ACTIVE_DIRECTORY\",\"credentialProvider\":null,\"credentialType\":\"PASSWORD\",\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"trsq3WGy8SeSeaoSRiohJxtow\"},\"displayMessage\":\"Authenticate user with AD agent\",\"eventType\":\"user.authentication.auth_via_AD_agent\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"Login Failed\"},\"published\":\"2023-10-03T15:44:17.600Z\",\"securityContext\":{\"asNumber\":3561,\"asOrg\":\"san diego private bank\",\"isp\":\"centurylink communications llc\",\"domain\":\"merituspayment.com\",\"isProxy\":false},\"severity\":\"ERROR\",\"debugContext\":{\"debugData\":{\"requestId\":\"ZRw20WgxbdCcsPJ2V1qIGUMBRELLACME\",\"dtHash\":\"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f\",\"requestUri\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult\",\"url\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5\"}},\"legacyEventType\":\"app.ad.agent.user_auth.error\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZRw20WgxbdCcsPJ2V1qIGUMBRELLACME\",\"detail\":{\"requestApiTokenId\":\"00Tb3jwyxdZ9wzFyO696\"}},\"uuid\":\"b62eac19-6203-11ee-a5be-01e9b0dd7093\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"47.237.191.34\",\"geographicalContext\":{\"city\":\"Santa Ana\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92704\",\"geolocation\":{\"lat\":33.7256,\"lon\":-117.9119}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa16yxhp6iUzuI2b697\",\"type\":\"AppInstance\",\"alternateId\":\"SDPB.LOCAL\",\"displayName\":\"Active Directory\",\"detailEntry\":null}]}} ::: program=UNKNOWN ::: clientIP=47.237.191.34 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "UNKNOWN", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "tags": [ "userDisplay=undefined | undefined", "reason=WitFoo.Switch(FAILURE)", "Okta", "description=Authenticate user with AD agent", "auth_failure" ], "vendorcode": "user.authentication.auth_via_AD_agent", "streamName": "Okta", "clientIP": "47.237.191.34", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"47.237.191.34","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGUMBRELLACME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGUMBRELLACME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"47.237.191.34","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=47.237.191.34 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
Product: Okta Vendor: Okta
Identify this syslog message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"47.237.191.34","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGUMBRELLACME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGUMBRELLACME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"47.237.191.34","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=47.237.191.34 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message: action: FAILURE georegion: United States messagetype: auth_failure productids: [6] program: UNKNOWN senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown tags: ['userDisplay=undefined | undefined', 'reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=Authenticate user with AD agent', 'auth_failure'] vendorcode: user.authentication.auth_via_AD_agent streamName: Okta clientIP: 47.237.191.34 userName: fish
Explain this syslog message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"nighthawk","email":"nighthawk"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"nighthawk","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"88.89.146.185","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGACMECME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGACMECME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"88.89.146.185","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=88.89.146.185 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
{ "action": "FAILURE", "georegion": "United States", "message": "WitFoo-Artifact ::: tags=[\"description=Authenticate user with AD agent\",\"userDisplay=undefined | undefined\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u176suj2KgPRj9K697\",\"status\":\"ACTIVE\",\"created\":\"2022-05-27T15:49:21.000Z\",\"activated\":\"2022-05-27T15:49:22.000Z\",\"statusChanged\":\"2023-05-03T17:47:47.000Z\",\"lastLogin\":\"2023-05-18T17:12:00.000Z\",\"lastUpdated\":\"2023-05-18T23:25:08.000Z\",\"passwordChanged\":\"2023-05-03T17:47:47.000Z\",\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"IT\",\"lastName\":\"Support\",\"mobilePhone\":null,\"secondEmail\":\"\",\"login\":\"nighthawk\",\"email\":\"nighthawk\"},\"credentials\":{\"password\":{},\"provider\":{\"type\":\"OKTA\",\"name\":\"OKTA\"}},\"_links\":{\"suspend\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697\"},\"resetFactors\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u176suj2KgPRj9K697\",\"type\":\"User\",\"alternateId\":\"nighthawk\",\"displayName\":\"IT Support\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)\",\"os\":\"Windows 8\",\"browser\":\"UNKNOWN\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":\"cappT0Hfy97F1BoO1UTR\",\"ipAddress\":\"88.89.146.185\",\"geographicalContext\":{\"city\":\"Santa Ana\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92704\",\"geolocation\":{\"lat\":33.7256,\"lon\":-117.9119}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":\"ACTIVE_DIRECTORY\",\"credentialProvider\":null,\"credentialType\":\"PASSWORD\",\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"trsq3WGy8SeSeaoSRiohJxtow\"},\"displayMessage\":\"Authenticate user with AD agent\",\"eventType\":\"user.authentication.auth_via_AD_agent\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"Login Failed\"},\"published\":\"2023-10-03T15:44:17.600Z\",\"securityContext\":{\"asNumber\":3561,\"asOrg\":\"san diego private bank\",\"isp\":\"centurylink communications llc\",\"domain\":\"merituspayment.com\",\"isProxy\":false},\"severity\":\"ERROR\",\"debugContext\":{\"debugData\":{\"requestId\":\"ZRw20WgxbdCcsPJ2V1qIGACMECME\",\"dtHash\":\"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f\",\"requestUri\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult\",\"url\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5\"}},\"legacyEventType\":\"app.ad.agent.user_auth.error\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZRw20WgxbdCcsPJ2V1qIGACMECME\",\"detail\":{\"requestApiTokenId\":\"00Tb3jwyxdZ9wzFyO696\"}},\"uuid\":\"b62eac19-6203-11ee-a5be-01e9b0dd7093\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"88.89.146.185\",\"geographicalContext\":{\"city\":\"Santa Ana\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92704\",\"geolocation\":{\"lat\":33.7256,\"lon\":-117.9119}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa16yxhp6iUzuI2b697\",\"type\":\"AppInstance\",\"alternateId\":\"SDPB.LOCAL\",\"displayName\":\"Active Directory\",\"detailEntry\":null}]}} ::: program=UNKNOWN ::: clientIP=88.89.146.185 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "UNKNOWN", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "tags": [ "userDisplay=undefined | undefined", "reason=WitFoo.Switch(FAILURE)", "Okta", "description=Authenticate user with AD agent", "auth_failure" ], "vendorcode": "user.authentication.auth_via_AD_agent", "streamName": "Okta", "clientIP": "88.89.146.185", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"nighthawk","email":"nighthawk"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"nighthawk","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"88.89.146.185","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGACMECME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGACMECME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"88.89.146.185","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=88.89.146.185 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
Product: Okta Vendor: Okta
Identify this syslog message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"nighthawk","email":"nighthawk"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"nighthawk","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"88.89.146.185","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGACMECME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGACMECME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"88.89.146.185","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=88.89.146.185 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message: action: FAILURE georegion: United States messagetype: auth_failure productids: [6] program: UNKNOWN senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown tags: ['userDisplay=undefined | undefined', 'reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=Authenticate user with AD agent', 'auth_failure'] vendorcode: user.authentication.auth_via_AD_agent streamName: Okta clientIP: 88.89.146.185 userName: nighthawk
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t78.87.247.246\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"78.87.247.246","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}}
{ "action": "Logon", "clientport": 53223, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-09T13:00:06.894Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-09T13:00:08.172Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tsdpb.local\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCMANAGEENGINE\\n\\tSource Network Address:\\t78.87.247.246\\n\\tSource Port:\\t\\t53223\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"78.87.247.246\",\"IpPort\":\"53223\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"sdpb.local\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCMANAGEENGINE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2180}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6638217117,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6638217117", "streamName": "microsoft-windows-security-auditing", "clientIP": "78.87.247.246", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t78.87.247.246\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"78.87.247.246","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t78.87.247.246\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"78.87.247.246","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53223 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6638217117 streamName: microsoft-windows-security-auditing clientIP: 78.87.247.246 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t71.216.237.251\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"71.216.237.251","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}}
{ "action": "Logon", "clientport": 53223, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-09T13:00:06.894Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-09T13:00:08.172Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tsdpb.local\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCMANAGEENGINE\\n\\tSource Network Address:\\t71.216.237.251\\n\\tSource Port:\\t\\t53223\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"71.216.237.251\",\"IpPort\":\"53223\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"sdpb.local\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCMANAGEENGINE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2180}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6638217117,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6638217117", "streamName": "microsoft-windows-security-auditing", "clientIP": "71.216.237.251", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t71.216.237.251\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"71.216.237.251","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t71.216.237.251\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"71.216.237.251","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53223 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6638217117 streamName: microsoft-windows-security-auditing clientIP: 71.216.237.251 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t243.119.130.229\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"243.119.130.229","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}}
{ "action": "Logon", "clientport": 53223, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-09T13:00:06.894Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-09T13:00:08.172Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tsdpb.local\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCMANAGEENGINE\\n\\tSource Network Address:\\t243.119.130.229\\n\\tSource Port:\\t\\t53223\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"243.119.130.229\",\"IpPort\":\"53223\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"sdpb.local\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCMANAGEENGINE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2180}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6638217117,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6638217117", "streamName": "microsoft-windows-security-auditing", "clientIP": "243.119.130.229", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t243.119.130.229\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"243.119.130.229","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t243.119.130.229\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"243.119.130.229","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53223 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6638217117 streamName: microsoft-windows-security-auditing clientIP: 243.119.130.229 userName: janedoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t123.208.161.74\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"123.208.161.74","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}}
{ "action": "Logon", "clientport": 53223, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-09T13:00:06.894Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-09T13:00:08.172Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tsdpb.local\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCMANAGEENGINE\\n\\tSource Network Address:\\t123.208.161.74\\n\\tSource Port:\\t\\t53223\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"123.208.161.74\",\"IpPort\":\"53223\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"sdpb.local\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCMANAGEENGINE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2180}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6638217117,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6638217117", "streamName": "microsoft-windows-security-auditing", "clientIP": "123.208.161.74", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t123.208.161.74\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"123.208.161.74","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t123.208.161.74\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"123.208.161.74","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53223 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6638217117 streamName: microsoft-windows-security-auditing clientIP: 123.208.161.74 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"84.244.181.221","externalIp":"190.29.0.69","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=84.244.181.221 ::: serverIP=190.29.0.69 ::: userName=fish ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-31T21:31:53.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"84.244.181.221\",\"externalIp\":\"190.29.0.69\",\"categories\":[\"Malware\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"cab8fsphak15dd000010y57568uuxhcx6.oast.live\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-31T21:31:53.000Z\"} ::: clientIP=84.244.181.221 ::: serverIP=190.29.0.69 ::: userName=fish ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "cab8fsphak15dd000010y57568uuxhcx6.oast.live", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "cab8fsphak15dd000010y57568uuxhcx6.oast.live", "vendorcode": "MalwareInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "84.244.181.221", "serverIP": "190.29.0.69", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"84.244.181.221","externalIp":"190.29.0.69","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=84.244.181.221 ::: serverIP=190.29.0.69 ::: userName=fish ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"84.244.181.221","externalIp":"190.29.0.69","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=84.244.181.221 ::: serverIP=190.29.0.69 ::: userName=fish ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-31T21:31:53.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: cab8fsphak15dd000010y57568uuxhcx6.oast.live messagetype: firewall_action severitycode: 2 fqdn: cab8fsphak15dd000010y57568uuxhcx6.oast.live vendorcode: MalwareInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 84.244.181.221 serverIP: 190.29.0.69 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"36.180.140.4","externalIp":"236.154.164.80","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=36.180.140.4 ::: serverIP=236.154.164.80 ::: userName=fish ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-31T21:31:53.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"36.180.140.4\",\"externalIp\":\"236.154.164.80\",\"categories\":[\"Malware\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"cab8fsphak15dd000010y57568uuxhcx6.oast.live\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-31T21:31:53.000Z\"} ::: clientIP=36.180.140.4 ::: serverIP=236.154.164.80 ::: userName=fish ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "cab8fsphak15dd000010y57568uuxhcx6.oast.live", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "cab8fsphak15dd000010y57568uuxhcx6.oast.live", "vendorcode": "MalwareInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "36.180.140.4", "serverIP": "236.154.164.80", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"36.180.140.4","externalIp":"236.154.164.80","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=36.180.140.4 ::: serverIP=236.154.164.80 ::: userName=fish ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"36.180.140.4","externalIp":"236.154.164.80","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=36.180.140.4 ::: serverIP=236.154.164.80 ::: userName=fish ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-31T21:31:53.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: cab8fsphak15dd000010y57568uuxhcx6.oast.live messagetype: firewall_action severitycode: 2 fqdn: cab8fsphak15dd000010y57568uuxhcx6.oast.live vendorcode: MalwareInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 36.180.140.4 serverIP: 236.154.164.80 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"61.107.8.127","externalIp":"132.36.219.16","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=61.107.8.127 ::: serverIP=132.36.219.16 ::: userName=nighthawk ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-31T21:31:53.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"61.107.8.127\",\"externalIp\":\"132.36.219.16\",\"categories\":[\"Malware\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"cab8fsphak15dd000010y57568uuxhcx6.oast.live\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-31T21:31:53.000Z\"} ::: clientIP=61.107.8.127 ::: serverIP=132.36.219.16 ::: userName=nighthawk ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "cab8fsphak15dd000010y57568uuxhcx6.oast.live", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "cab8fsphak15dd000010y57568uuxhcx6.oast.live", "vendorcode": "MalwareInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "61.107.8.127", "serverIP": "132.36.219.16", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"61.107.8.127","externalIp":"132.36.219.16","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=61.107.8.127 ::: serverIP=132.36.219.16 ::: userName=nighthawk ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"61.107.8.127","externalIp":"132.36.219.16","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=61.107.8.127 ::: serverIP=132.36.219.16 ::: userName=nighthawk ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-31T21:31:53.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: cab8fsphak15dd000010y57568uuxhcx6.oast.live messagetype: firewall_action severitycode: 2 fqdn: cab8fsphak15dd000010y57568uuxhcx6.oast.live vendorcode: MalwareInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 61.107.8.127 serverIP: 132.36.219.16 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"206.251.79.138","externalIp":"248.218.66.201","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=206.251.79.138 ::: serverIP=248.218.66.201 ::: userName=janedoe ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-31T21:31:53.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"206.251.79.138\",\"externalIp\":\"248.218.66.201\",\"categories\":[\"Malware\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"cab8fsphak15dd000010y57568uuxhcx6.oast.live\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-31T21:31:53.000Z\"} ::: clientIP=206.251.79.138 ::: serverIP=248.218.66.201 ::: userName=janedoe ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "cab8fsphak15dd000010y57568uuxhcx6.oast.live", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "cab8fsphak15dd000010y57568uuxhcx6.oast.live", "vendorcode": "MalwareInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "206.251.79.138", "serverIP": "248.218.66.201", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"206.251.79.138","externalIp":"248.218.66.201","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=206.251.79.138 ::: serverIP=248.218.66.201 ::: userName=janedoe ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"206.251.79.138","externalIp":"248.218.66.201","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=206.251.79.138 ::: serverIP=248.218.66.201 ::: userName=janedoe ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-31T21:31:53.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: cab8fsphak15dd000010y57568uuxhcx6.oast.live messagetype: firewall_action severitycode: 2 fqdn: cab8fsphak15dd000010y57568uuxhcx6.oast.live vendorcode: MalwareInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 206.251.79.138 serverIP: 248.218.66.201 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"57.187.178.255","externalIp":"106.245.39.28","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=57.187.178.255 ::: serverIP=106.245.39.28 ::: userName=nighthawk ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-26T15:53:35.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"57.187.178.255\",\"externalIp\":\"106.245.39.28\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:53:35.000Z\"} ::: clientIP=57.187.178.255 ::: serverIP=106.245.39.28 ::: userName=nighthawk ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ivu.fbc-statesboro.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ivu.fbc-statesboro.org", "vendorcode": "ReligiousPhishingReligion", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "57.187.178.255", "serverIP": "106.245.39.28", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"57.187.178.255","externalIp":"106.245.39.28","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=57.187.178.255 ::: serverIP=106.245.39.28 ::: userName=nighthawk ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"57.187.178.255","externalIp":"106.245.39.28","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=57.187.178.255 ::: serverIP=106.245.39.28 ::: userName=nighthawk ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-26T15:53:35.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ivu.fbc-statesboro.org messagetype: firewall_action severitycode: 2 fqdn: ivu.fbc-statesboro.org vendorcode: ReligiousPhishingReligion action: block streamName: OpenDNS Detection clientIP: 57.187.178.255 serverIP: 106.245.39.28 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"166.70.7.203","externalIp":"160.229.1.241","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=166.70.7.203 ::: serverIP=160.229.1.241 ::: userName=johndoe ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-26T15:53:35.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"166.70.7.203\",\"externalIp\":\"160.229.1.241\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:53:35.000Z\"} ::: clientIP=166.70.7.203 ::: serverIP=160.229.1.241 ::: userName=johndoe ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ivu.fbc-statesboro.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ivu.fbc-statesboro.org", "vendorcode": "ReligiousPhishingReligion", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "166.70.7.203", "serverIP": "160.229.1.241", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"166.70.7.203","externalIp":"160.229.1.241","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=166.70.7.203 ::: serverIP=160.229.1.241 ::: userName=johndoe ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"166.70.7.203","externalIp":"160.229.1.241","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=166.70.7.203 ::: serverIP=160.229.1.241 ::: userName=johndoe ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-26T15:53:35.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ivu.fbc-statesboro.org messagetype: firewall_action severitycode: 2 fqdn: ivu.fbc-statesboro.org vendorcode: ReligiousPhishingReligion action: block streamName: OpenDNS Detection clientIP: 166.70.7.203 serverIP: 160.229.1.241 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"52.55.245.166","externalIp":"34.170.220.207","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=52.55.245.166 ::: serverIP=34.170.220.207 ::: userName=bob ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-26T15:38:39.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"52.55.245.166\",\"externalIp\":\"34.170.220.207\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:38:39.000Z\"} ::: clientIP=52.55.245.166 ::: serverIP=34.170.220.207 ::: userName=bob ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ivu.fbc-statesboro.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ivu.fbc-statesboro.org", "vendorcode": "ReligiousPhishingReligion", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "52.55.245.166", "serverIP": "34.170.220.207", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"52.55.245.166","externalIp":"34.170.220.207","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=52.55.245.166 ::: serverIP=34.170.220.207 ::: userName=bob ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"52.55.245.166","externalIp":"34.170.220.207","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=52.55.245.166 ::: serverIP=34.170.220.207 ::: userName=bob ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-26T15:38:39.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ivu.fbc-statesboro.org messagetype: firewall_action severitycode: 2 fqdn: ivu.fbc-statesboro.org vendorcode: ReligiousPhishingReligion action: block streamName: OpenDNS Detection clientIP: 52.55.245.166 serverIP: 34.170.220.207 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"89.144.121.158","externalIp":"179.16.178.140","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=89.144.121.158 ::: serverIP=179.16.178.140 ::: userName=nighthawk ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-26T15:38:39.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"89.144.121.158\",\"externalIp\":\"179.16.178.140\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:38:39.000Z\"} ::: clientIP=89.144.121.158 ::: serverIP=179.16.178.140 ::: userName=nighthawk ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ivu.fbc-statesboro.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ivu.fbc-statesboro.org", "vendorcode": "ReligiousPhishingReligion", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "89.144.121.158", "serverIP": "179.16.178.140", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"89.144.121.158","externalIp":"179.16.178.140","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=89.144.121.158 ::: serverIP=179.16.178.140 ::: userName=nighthawk ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"89.144.121.158","externalIp":"179.16.178.140","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=89.144.121.158 ::: serverIP=179.16.178.140 ::: userName=nighthawk ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-26T15:38:39.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ivu.fbc-statesboro.org messagetype: firewall_action severitycode: 2 fqdn: ivu.fbc-statesboro.org vendorcode: ReligiousPhishingReligion action: block streamName: OpenDNS Detection clientIP: 89.144.121.158 serverIP: 179.16.178.140 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"20.165.148.81","externalIp":"169.11.32.196","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=20.165.148.81 ::: serverIP=169.11.32.196 ::: userName=bob ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-26T15:44:55.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"20.165.148.81\",\"externalIp\":\"169.11.32.196\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:44:55.000Z\"} ::: clientIP=20.165.148.81 ::: serverIP=169.11.32.196 ::: userName=bob ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ivu.fbc-statesboro.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ivu.fbc-statesboro.org", "vendorcode": "ReligiousPhishingReligion", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "20.165.148.81", "serverIP": "169.11.32.196", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"20.165.148.81","externalIp":"169.11.32.196","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=20.165.148.81 ::: serverIP=169.11.32.196 ::: userName=bob ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"20.165.148.81","externalIp":"169.11.32.196","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=20.165.148.81 ::: serverIP=169.11.32.196 ::: userName=bob ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-26T15:44:55.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ivu.fbc-statesboro.org messagetype: firewall_action severitycode: 2 fqdn: ivu.fbc-statesboro.org vendorcode: ReligiousPhishingReligion action: block streamName: OpenDNS Detection clientIP: 20.165.148.81 serverIP: 169.11.32.196 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"17.138.21.138","externalIp":"133.240.217.146","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=17.138.21.138 ::: serverIP=133.240.217.146 ::: userName=nighthawk ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-26T15:44:55.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"17.138.21.138\",\"externalIp\":\"133.240.217.146\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:44:55.000Z\"} ::: clientIP=17.138.21.138 ::: serverIP=133.240.217.146 ::: userName=nighthawk ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ivu.fbc-statesboro.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ivu.fbc-statesboro.org", "vendorcode": "ReligiousPhishingReligion", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "17.138.21.138", "serverIP": "133.240.217.146", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"17.138.21.138","externalIp":"133.240.217.146","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=17.138.21.138 ::: serverIP=133.240.217.146 ::: userName=nighthawk ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"17.138.21.138","externalIp":"133.240.217.146","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=17.138.21.138 ::: serverIP=133.240.217.146 ::: userName=nighthawk ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-26T15:44:55.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ivu.fbc-statesboro.org messagetype: firewall_action severitycode: 2 fqdn: ivu.fbc-statesboro.org vendorcode: ReligiousPhishingReligion action: block streamName: OpenDNS Detection clientIP: 17.138.21.138 serverIP: 133.240.217.146 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"110.23.138.90","externalIp":"139.163.79.60","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=110.23.138.90 ::: serverIP=139.163.79.60 ::: userName=janedoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-25T09:24:49.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"110.23.138.90\",\"externalIp\":\"139.163.79.60\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-25T09:24:49.000Z\"} ::: clientIP=110.23.138.90 ::: serverIP=139.163.79.60 ::: userName=janedoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "110.23.138.90", "serverIP": "139.163.79.60", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"110.23.138.90","externalIp":"139.163.79.60","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=110.23.138.90 ::: serverIP=139.163.79.60 ::: userName=janedoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"110.23.138.90","externalIp":"139.163.79.60","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=110.23.138.90 ::: serverIP=139.163.79.60 ::: userName=janedoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-25T09:24:49.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 110.23.138.90 serverIP: 139.163.79.60 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"94.237.251.140","externalIp":"136.112.178.183","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=94.237.251.140 ::: serverIP=136.112.178.183 ::: userName=janedoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-25T09:24:49.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"94.237.251.140\",\"externalIp\":\"136.112.178.183\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-25T09:24:49.000Z\"} ::: clientIP=94.237.251.140 ::: serverIP=136.112.178.183 ::: userName=janedoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "94.237.251.140", "serverIP": "136.112.178.183", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"94.237.251.140","externalIp":"136.112.178.183","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=94.237.251.140 ::: serverIP=136.112.178.183 ::: userName=janedoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"94.237.251.140","externalIp":"136.112.178.183","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=94.237.251.140 ::: serverIP=136.112.178.183 ::: userName=janedoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-25T09:24:49.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 94.237.251.140 serverIP: 136.112.178.183 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"181.189.181.229","externalIp":"48.138.125.34","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=181.189.181.229 ::: serverIP=48.138.125.34 ::: userName=johndoe ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-26T15:53:35.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"181.189.181.229\",\"externalIp\":\"48.138.125.34\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:53:35.000Z\"} ::: clientIP=181.189.181.229 ::: serverIP=48.138.125.34 ::: userName=johndoe ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ivu.fbc-statesboro.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ivu.fbc-statesboro.org", "vendorcode": "ReligiousPhishingReligion", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "181.189.181.229", "serverIP": "48.138.125.34", "userName": "johndoe" }
Create a JSON artifact from the message