input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f ::: program=Microsoft OneDrive ::: message={"_id":"a533abc31101969f3a41697c","access_method":"Client","acked":"false","action":"alert","activity":"Download","alert":"yes","alert_name":"DLP PCI Alert","alert_type":"DLP","app":"Microsoft OneDrive","app_session_id":3483912176895852176,"appcategory":"Cloud Storage","appsuite":"Microsoft Live","browser":"Native","browser_session_id":4752751631097491507,"category":"Cloud Storage","ccl":"high","connection_id":2762431970988418783,"device":"Windows Device","device_classification":"unmanaged","dlp_incident_id":4233141258481957646,"dlp_is_unique_count":"false","dlp_parent_id":4233141258481957646,"dlp_profile":"Payment Card Industry Data Security Standard. PCI-DSS","dlp_rule":"INTL-PAN-Name","dlp_rule_count":14375,"dlp_rule_severity":"Critical","dst_country":"US","dst_location":"Redmond","dst_region":"Washington","dst_timezone":"America/Los_Angeles","dst_zipcode":"N/A","dstip":"165.130.133.250","file_lang":"ENGLISH","file_size":10256549,"file_type":"text/plain","hostname":"Jenga-Surface","incident_id":1523448449225732235,"managed_app":"yes","md5":"2f6df9969215d9eb4d266dd636337da7","object_type":"File","organization_unit":"","os":"Windows 11","os_version":"Windows 11","outer_doc_type":0,"page":"ahokbw.sn.files.1drv.com","page_site":"Microsoft OneDrive","policy":"DLP PCI Alert","policy_id":"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367","protocol":"HTTPS/1.1","request_id":2735518334081635584,"scan_type":"","severity":"unknown","sha256":"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f","site":"Microsoft OneDrive","src_country":"US","src_location":"San Diego","src_region":"California","src_time":"Wed Dec 20 14:33:08 2023","src_timezone":"America/Los_Angeles","src_zipcode":"92110","srcip":"196.146.164.186","timestamp":1703111613,"traffic_type":"CloudApp","transaction_id":1523448449225732235,"true_obj_category":"Text","true_obj_type":"Plain Text file","true_type_id":2,"tss_mode":"inline","type":"nspolicy","ur_normalized":"bob","url":"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k","user":"bob","userip":"192.168.1.194","userkey":"bob","dynamic_classification":"","message_size":0,"universal_connector":"","displayName":"","mime_type":"","violating_user":"","user_id":"","file_cls_encrypted":false,"sAMAccountName":"","channel":"","orignal_file_path":"","data_type":"","classification_name":"","userPrincipalName":"","from_storage":"","owner_pdl":"","group":"","total_collaborator_count":0,"message_id":"","dlp_file":"credit_cards.12.db","instance_id":"","browser_version":"","exposure":"","act_user":"","dlp_unique_count":0,"smtp_to":[],"suppression_key":"credit_cards.12.db","external_collaborator_count":0,"file_category":"","collaborated":"","manager":"","mail":"","sub_type":"","app_activity":"","managementID":"","file_path":"","to_storage":"","dlp_mail_parent_id":"","dlp_fingerprint_match":"","retro_scan_name":"","src_geoip_src":0,"userCountry":"","file_password_protected":"","web_universal_connector":"","dlp_fingerprint_score":0,"sanctioned_instance":"","referer":"","parent_id":"","title":"credit_cards.12.db","to_user":"","shared_with":"","dst_geoip_src":0,"object_id":"","from_user":"","shared_domains":"","instance":"","modified":0,"true_filetype":"","dlp_rule_score":0,"dlp_fingerprint_classification":"","violating_user_type":"","local_sha256":"","object":"credit_cards.12.db","owner":"","bcc":""} ::: fileHashType=sha256 ::: clientHostname=Jenga-Surface ::: startTimeUTC=2023-12-20T22:33:33Z ::: streamName=netskope ::: messageType=data_exfiltration ::: serverIP=165.130.133.250 ::: userName=bob ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),Payment Card Industry Data Security Standard. PCI-DSS,INTL-PAN-Name] ::: clientIP=196.146.164.186 | {
"clienthostname": "Jenga-Surface",
"filehash": "26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f",
"message": "WitFoo-Artifact ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f ::: program=Microsoft OneDrive ::: message={\"_id\":\"a533abc31101969f3a41697c\",\"access_method\":\"Client\",\"acked\":\"false\",\"action\":\"alert\",\"activity\":\"Download\",\"alert\":\"yes\",\"alert_name\":\"DLP PCI Alert\",\"alert_type\":\"DLP\",\"app\":\"Microsoft OneDrive\",\"app_session_id\":3483912176895852176,\"appcategory\":\"Cloud Storage\",\"appsuite\":\"Microsoft Live\",\"browser\":\"Native\",\"browser_session_id\":4752751631097491507,\"category\":\"Cloud Storage\",\"ccl\":\"high\",\"connection_id\":2762431970988418783,\"device\":\"Windows Device\",\"device_classification\":\"unmanaged\",\"dlp_incident_id\":4233141258481957646,\"dlp_is_unique_count\":\"false\",\"dlp_parent_id\":4233141258481957646,\"dlp_profile\":\"Payment Card Industry Data Security Standard. PCI-DSS\",\"dlp_rule\":\"INTL-PAN-Name\",\"dlp_rule_count\":14375,\"dlp_rule_severity\":\"Critical\",\"dst_country\":\"US\",\"dst_location\":\"Redmond\",\"dst_region\":\"Washington\",\"dst_timezone\":\"America/Los_Angeles\",\"dst_zipcode\":\"N/A\",\"dstip\":\"165.130.133.250\",\"file_lang\":\"ENGLISH\",\"file_size\":10256549,\"file_type\":\"text/plain\",\"hostname\":\"Jenga-Surface\",\"incident_id\":1523448449225732235,\"managed_app\":\"yes\",\"md5\":\"2f6df9969215d9eb4d266dd636337da7\",\"object_type\":\"File\",\"organization_unit\":\"\",\"os\":\"Windows 11\",\"os_version\":\"Windows 11\",\"outer_doc_type\":0,\"page\":\"ahokbw.sn.files.1drv.com\",\"page_site\":\"Microsoft OneDrive\",\"policy\":\"DLP PCI Alert\",\"policy_id\":\"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367\",\"protocol\":\"HTTPS/1.1\",\"request_id\":2735518334081635584,\"scan_type\":\"\",\"severity\":\"unknown\",\"sha256\":\"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f\",\"site\":\"Microsoft OneDrive\",\"src_country\":\"US\",\"src_location\":\"San Diego\",\"src_region\":\"California\",\"src_time\":\"Wed Dec 20 14:33:08 2023\",\"src_timezone\":\"America/Los_Angeles\",\"src_zipcode\":\"92110\",\"srcip\":\"196.146.164.186\",\"timestamp\":1703111613,\"traffic_type\":\"CloudApp\",\"transaction_id\":1523448449225732235,\"true_obj_category\":\"Text\",\"true_obj_type\":\"Plain Text file\",\"true_type_id\":2,\"tss_mode\":\"inline\",\"type\":\"nspolicy\",\"ur_normalized\":\"bob\",\"url\":\"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k\",\"user\":\"bob\",\"userip\":\"192.168.1.194\",\"userkey\":\"bob\",\"dynamic_classification\":\"\",\"message_size\":0,\"universal_connector\":\"\",\"displayName\":\"\",\"mime_type\":\"\",\"violating_user\":\"\",\"user_id\":\"\",\"file_cls_encrypted\":false,\"sAMAccountName\":\"\",\"channel\":\"\",\"orignal_file_path\":\"\",\"data_type\":\"\",\"classification_name\":\"\",\"userPrincipalName\":\"\",\"from_storage\":\"\",\"owner_pdl\":\"\",\"group\":\"\",\"total_collaborator_count\":0,\"message_id\":\"\",\"dlp_file\":\"credit_cards.12.db\",\"instance_id\":\"\",\"browser_version\":\"\",\"exposure\":\"\",\"act_user\":\"\",\"dlp_unique_count\":0,\"smtp_to\":[],\"suppression_key\":\"credit_cards.12.db\",\"external_collaborator_count\":0,\"file_category\":\"\",\"collaborated\":\"\",\"manager\":\"\",\"mail\":\"\",\"sub_type\":\"\",\"app_activity\":\"\",\"managementID\":\"\",\"file_path\":\"\",\"to_storage\":\"\",\"dlp_mail_parent_id\":\"\",\"dlp_fingerprint_match\":\"\",\"retro_scan_name\":\"\",\"src_geoip_src\":0,\"userCountry\":\"\",\"file_password_protected\":\"\",\"web_universal_connector\":\"\",\"dlp_fingerprint_score\":0,\"sanctioned_instance\":\"\",\"referer\":\"\",\"parent_id\":\"\",\"title\":\"credit_cards.12.db\",\"to_user\":\"\",\"shared_with\":\"\",\"dst_geoip_src\":0,\"object_id\":\"\",\"from_user\":\"\",\"shared_domains\":\"\",\"instance\":\"\",\"modified\":0,\"true_filetype\":\"\",\"dlp_rule_score\":0,\"dlp_fingerprint_classification\":\"\",\"violating_user_type\":\"\",\"local_sha256\":\"\",\"object\":\"credit_cards.12.db\",\"owner\":\"\",\"bcc\":\"\"} ::: fileHashType=sha256 ::: clientHostname=Jenga-Surface ::: startTimeUTC=2023-12-20T22:33:33Z ::: streamName=netskope ::: messageType=data_exfiltration ::: serverIP=165.130.133.250 ::: userName=bob ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),Payment Card Industry Data Security Standard. PCI-DSS,INTL-PAN-Name] ::: clientIP=196.146.164.186",
"messagetype": "data_exfiltration",
"program": "Microsoft OneDrive",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"starttimeutc": "2023-12-20T22:33:33Z",
"tags": [
"data_exfiltration",
"netskope",
"INTL-PAN-Name",
"Payment Card Industry Data Security Standard. PCI-DSS",
"Windows Device(unmanaged)",
"DLP PCI Alert",
"Cloud Storage",
"Microsoft OneDrive"
],
"streamName": "netskope",
"clientIP": "196.146.164.186",
"serverIP": "165.130.133.250",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f ::: program=Microsoft OneDrive ::: message={"_id":"a533abc31101969f3a41697c","access_method":"Client","acked":"false","action":"alert","activity":"Download","alert":"yes","alert_name":"DLP PCI Alert","alert_type":"DLP","app":"Microsoft OneDrive","app_session_id":3483912176895852176,"appcategory":"Cloud Storage","appsuite":"Microsoft Live","browser":"Native","browser_session_id":4752751631097491507,"category":"Cloud Storage","ccl":"high","connection_id":2762431970988418783,"device":"Windows Device","device_classification":"unmanaged","dlp_incident_id":4233141258481957646,"dlp_is_unique_count":"false","dlp_parent_id":4233141258481957646,"dlp_profile":"Payment Card Industry Data Security Standard. PCI-DSS","dlp_rule":"INTL-PAN-Name","dlp_rule_count":14375,"dlp_rule_severity":"Critical","dst_country":"US","dst_location":"Redmond","dst_region":"Washington","dst_timezone":"America/Los_Angeles","dst_zipcode":"N/A","dstip":"165.130.133.250","file_lang":"ENGLISH","file_size":10256549,"file_type":"text/plain","hostname":"Jenga-Surface","incident_id":1523448449225732235,"managed_app":"yes","md5":"2f6df9969215d9eb4d266dd636337da7","object_type":"File","organization_unit":"","os":"Windows 11","os_version":"Windows 11","outer_doc_type":0,"page":"ahokbw.sn.files.1drv.com","page_site":"Microsoft OneDrive","policy":"DLP PCI Alert","policy_id":"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367","protocol":"HTTPS/1.1","request_id":2735518334081635584,"scan_type":"","severity":"unknown","sha256":"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f","site":"Microsoft OneDrive","src_country":"US","src_location":"San Diego","src_region":"California","src_time":"Wed Dec 20 14:33:08 2023","src_timezone":"America/Los_Angeles","src_zipcode":"92110","srcip":"196.146.164.186","timestamp":1703111613,"traffic_type":"CloudApp","transaction_id":1523448449225732235,"true_obj_category":"Text","true_obj_type":"Plain Text file","true_type_id":2,"tss_mode":"inline","type":"nspolicy","ur_normalized":"bob","url":"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k","user":"bob","userip":"192.168.1.194","userkey":"bob","dynamic_classification":"","message_size":0,"universal_connector":"","displayName":"","mime_type":"","violating_user":"","user_id":"","file_cls_encrypted":false,"sAMAccountName":"","channel":"","orignal_file_path":"","data_type":"","classification_name":"","userPrincipalName":"","from_storage":"","owner_pdl":"","group":"","total_collaborator_count":0,"message_id":"","dlp_file":"credit_cards.12.db","instance_id":"","browser_version":"","exposure":"","act_user":"","dlp_unique_count":0,"smtp_to":[],"suppression_key":"credit_cards.12.db","external_collaborator_count":0,"file_category":"","collaborated":"","manager":"","mail":"","sub_type":"","app_activity":"","managementID":"","file_path":"","to_storage":"","dlp_mail_parent_id":"","dlp_fingerprint_match":"","retro_scan_name":"","src_geoip_src":0,"userCountry":"","file_password_protected":"","web_universal_connector":"","dlp_fingerprint_score":0,"sanctioned_instance":"","referer":"","parent_id":"","title":"credit_cards.12.db","to_user":"","shared_with":"","dst_geoip_src":0,"object_id":"","from_user":"","shared_domains":"","instance":"","modified":0,"true_filetype":"","dlp_rule_score":0,"dlp_fingerprint_classification":"","violating_user_type":"","local_sha256":"","object":"credit_cards.12.db","owner":"","bcc":""} ::: fileHashType=sha256 ::: clientHostname=Jenga-Surface ::: startTimeUTC=2023-12-20T22:33:33Z ::: streamName=netskope ::: messageType=data_exfiltration ::: serverIP=165.130.133.250 ::: userName=bob ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),Payment Card Industry Data Security Standard. PCI-DSS,INTL-PAN-Name] ::: clientIP=196.146.164.186 | Product: Netskope
Vendor: Netskope | Identify this syslog message |
WitFoo-Artifact ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f ::: program=Microsoft OneDrive ::: message={"_id":"a533abc31101969f3a41697c","access_method":"Client","acked":"false","action":"alert","activity":"Download","alert":"yes","alert_name":"DLP PCI Alert","alert_type":"DLP","app":"Microsoft OneDrive","app_session_id":3483912176895852176,"appcategory":"Cloud Storage","appsuite":"Microsoft Live","browser":"Native","browser_session_id":4752751631097491507,"category":"Cloud Storage","ccl":"high","connection_id":2762431970988418783,"device":"Windows Device","device_classification":"unmanaged","dlp_incident_id":4233141258481957646,"dlp_is_unique_count":"false","dlp_parent_id":4233141258481957646,"dlp_profile":"Payment Card Industry Data Security Standard. PCI-DSS","dlp_rule":"INTL-PAN-Name","dlp_rule_count":14375,"dlp_rule_severity":"Critical","dst_country":"US","dst_location":"Redmond","dst_region":"Washington","dst_timezone":"America/Los_Angeles","dst_zipcode":"N/A","dstip":"165.130.133.250","file_lang":"ENGLISH","file_size":10256549,"file_type":"text/plain","hostname":"Jenga-Surface","incident_id":1523448449225732235,"managed_app":"yes","md5":"2f6df9969215d9eb4d266dd636337da7","object_type":"File","organization_unit":"","os":"Windows 11","os_version":"Windows 11","outer_doc_type":0,"page":"ahokbw.sn.files.1drv.com","page_site":"Microsoft OneDrive","policy":"DLP PCI Alert","policy_id":"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367","protocol":"HTTPS/1.1","request_id":2735518334081635584,"scan_type":"","severity":"unknown","sha256":"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f","site":"Microsoft OneDrive","src_country":"US","src_location":"San Diego","src_region":"California","src_time":"Wed Dec 20 14:33:08 2023","src_timezone":"America/Los_Angeles","src_zipcode":"92110","srcip":"196.146.164.186","timestamp":1703111613,"traffic_type":"CloudApp","transaction_id":1523448449225732235,"true_obj_category":"Text","true_obj_type":"Plain Text file","true_type_id":2,"tss_mode":"inline","type":"nspolicy","ur_normalized":"bob","url":"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k","user":"bob","userip":"192.168.1.194","userkey":"bob","dynamic_classification":"","message_size":0,"universal_connector":"","displayName":"","mime_type":"","violating_user":"","user_id":"","file_cls_encrypted":false,"sAMAccountName":"","channel":"","orignal_file_path":"","data_type":"","classification_name":"","userPrincipalName":"","from_storage":"","owner_pdl":"","group":"","total_collaborator_count":0,"message_id":"","dlp_file":"credit_cards.12.db","instance_id":"","browser_version":"","exposure":"","act_user":"","dlp_unique_count":0,"smtp_to":[],"suppression_key":"credit_cards.12.db","external_collaborator_count":0,"file_category":"","collaborated":"","manager":"","mail":"","sub_type":"","app_activity":"","managementID":"","file_path":"","to_storage":"","dlp_mail_parent_id":"","dlp_fingerprint_match":"","retro_scan_name":"","src_geoip_src":0,"userCountry":"","file_password_protected":"","web_universal_connector":"","dlp_fingerprint_score":0,"sanctioned_instance":"","referer":"","parent_id":"","title":"credit_cards.12.db","to_user":"","shared_with":"","dst_geoip_src":0,"object_id":"","from_user":"","shared_domains":"","instance":"","modified":0,"true_filetype":"","dlp_rule_score":0,"dlp_fingerprint_classification":"","violating_user_type":"","local_sha256":"","object":"credit_cards.12.db","owner":"","bcc":""} ::: fileHashType=sha256 ::: clientHostname=Jenga-Surface ::: startTimeUTC=2023-12-20T22:33:33Z ::: streamName=netskope ::: messageType=data_exfiltration ::: serverIP=165.130.133.250 ::: userName=bob ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),Payment Card Industry Data Security Standard. PCI-DSS,INTL-PAN-Name] ::: clientIP=196.146.164.186 | This is a syslog message from a product called Netskope by Netskope. The following fields were extracted from the message:
clienthostname: Jenga-Surface
filehash: 26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f
messagetype: data_exfiltration
program: Microsoft OneDrive
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
starttimeutc: 2023-12-20T22:33:33Z
tags: ['data_exfiltration', 'netskope', 'INTL-PAN-Name', 'Payment Card Industry Data Security Standard. PCI-DSS', 'Windows Device(unmanaged)', 'DLP PCI Alert', 'Cloud Storage', 'Microsoft OneDrive']
streamName: netskope
clientIP: 196.146.164.186
serverIP: 165.130.133.250
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: messageType=data_exfiltration ::: userName=charlie ::: clientHostname=Jenga-Surface ::: program=Microsoft OneDrive ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),DLP-PCI,Name-Credit Card (CC)] ::: message={"_id":"c5a301b62ac8d92b330ebb07","access_method":"Client","acked":"false","action":"alert","activity":"Download","alert":"yes","alert_name":"DLP PCI Alert","alert_type":"DLP","app":"Microsoft OneDrive","app_session_id":3483912176895852176,"appcategory":"Cloud Storage","appsuite":"Microsoft Live","browser":"Native","browser_session_id":4752751631097491507,"category":"Cloud Storage","ccl":"high","connection_id":2762431970988418783,"device":"Windows Device","device_classification":"unmanaged","dlp_incident_id":4233141258481957646,"dlp_is_unique_count":"false","dlp_parent_id":4233141258481957646,"dlp_profile":"DLP-PCI","dlp_rule":"Name-Credit Card (CC)","dlp_rule_count":179687,"dlp_rule_severity":"Critical","dst_country":"US","dst_location":"Redmond","dst_region":"Washington","dst_timezone":"America/Los_Angeles","dst_zipcode":"N/A","dstip":"16.31.95.68","file_lang":"ENGLISH","file_size":10256549,"file_type":"text/plain","hostname":"Jenga-Surface","incident_id":1523448449225732235,"managed_app":"yes","md5":"2f6df9969215d9eb4d266dd636337da7","object_type":"File","organization_unit":"","os":"Windows 11","os_version":"Windows 11","outer_doc_type":0,"page":"ahokbw.sn.files.1drv.com","page_site":"Microsoft OneDrive","policy":"DLP PCI Alert","policy_id":"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367","protocol":"HTTPS/1.1","request_id":2735518334081635584,"scan_type":"","severity":"unknown","sha256":"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f","site":"Microsoft OneDrive","src_country":"US","src_location":"San Diego","src_region":"California","src_time":"Wed Dec 20 14:33:08 2023","src_timezone":"America/Los_Angeles","src_zipcode":"92110","srcip":"144.51.136.197","timestamp":1703111613,"traffic_type":"CloudApp","transaction_id":1523448449225732235,"true_obj_category":"Text","true_obj_type":"Plain Text file","true_type_id":2,"tss_mode":"inline","type":"nspolicy","ur_normalized":"charlie","url":"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k","user":"charlie","userip":"192.168.1.194","userkey":"charlie","dynamic_classification":"","message_size":0,"universal_connector":"","displayName":"","mime_type":"","violating_user":"","user_id":"","file_cls_encrypted":false,"sAMAccountName":"","channel":"","orignal_file_path":"","data_type":"","classification_name":"","userPrincipalName":"","from_storage":"","owner_pdl":"","group":"","total_collaborator_count":0,"message_id":"","dlp_file":"credit_cards.12.db","instance_id":"","browser_version":"","exposure":"","act_user":"","dlp_unique_count":0,"smtp_to":[],"suppression_key":"credit_cards.12.db","external_collaborator_count":0,"file_category":"","collaborated":"","manager":"","mail":"","sub_type":"","app_activity":"","managementID":"","file_path":"","to_storage":"","dlp_mail_parent_id":"","dlp_fingerprint_match":"","retro_scan_name":"","src_geoip_src":0,"userCountry":"","file_password_protected":"","web_universal_connector":"","dlp_fingerprint_score":0,"sanctioned_instance":"","referer":"","parent_id":"","title":"credit_cards.12.db","to_user":"","shared_with":"","dst_geoip_src":0,"object_id":"","from_user":"","shared_domains":"","instance":"","modified":0,"true_filetype":"","dlp_rule_score":0,"dlp_fingerprint_classification":"","violating_user_type":"","local_sha256":"","object":"credit_cards.12.db","owner":"","bcc":""} ::: clientIP=144.51.136.197 ::: serverIP=16.31.95.68 ::: fileHashType=sha256 ::: streamName=netskope ::: startTimeUTC=2023-12-20T22:33:33Z ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f | {
"clienthostname": "Jenga-Surface",
"filehash": "26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f",
"message": "WitFoo-Artifact ::: messageType=data_exfiltration ::: userName=charlie ::: clientHostname=Jenga-Surface ::: program=Microsoft OneDrive ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),DLP-PCI,Name-Credit Card (CC)] ::: message={\"_id\":\"c5a301b62ac8d92b330ebb07\",\"access_method\":\"Client\",\"acked\":\"false\",\"action\":\"alert\",\"activity\":\"Download\",\"alert\":\"yes\",\"alert_name\":\"DLP PCI Alert\",\"alert_type\":\"DLP\",\"app\":\"Microsoft OneDrive\",\"app_session_id\":3483912176895852176,\"appcategory\":\"Cloud Storage\",\"appsuite\":\"Microsoft Live\",\"browser\":\"Native\",\"browser_session_id\":4752751631097491507,\"category\":\"Cloud Storage\",\"ccl\":\"high\",\"connection_id\":2762431970988418783,\"device\":\"Windows Device\",\"device_classification\":\"unmanaged\",\"dlp_incident_id\":4233141258481957646,\"dlp_is_unique_count\":\"false\",\"dlp_parent_id\":4233141258481957646,\"dlp_profile\":\"DLP-PCI\",\"dlp_rule\":\"Name-Credit Card (CC)\",\"dlp_rule_count\":179687,\"dlp_rule_severity\":\"Critical\",\"dst_country\":\"US\",\"dst_location\":\"Redmond\",\"dst_region\":\"Washington\",\"dst_timezone\":\"America/Los_Angeles\",\"dst_zipcode\":\"N/A\",\"dstip\":\"16.31.95.68\",\"file_lang\":\"ENGLISH\",\"file_size\":10256549,\"file_type\":\"text/plain\",\"hostname\":\"Jenga-Surface\",\"incident_id\":1523448449225732235,\"managed_app\":\"yes\",\"md5\":\"2f6df9969215d9eb4d266dd636337da7\",\"object_type\":\"File\",\"organization_unit\":\"\",\"os\":\"Windows 11\",\"os_version\":\"Windows 11\",\"outer_doc_type\":0,\"page\":\"ahokbw.sn.files.1drv.com\",\"page_site\":\"Microsoft OneDrive\",\"policy\":\"DLP PCI Alert\",\"policy_id\":\"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367\",\"protocol\":\"HTTPS/1.1\",\"request_id\":2735518334081635584,\"scan_type\":\"\",\"severity\":\"unknown\",\"sha256\":\"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f\",\"site\":\"Microsoft OneDrive\",\"src_country\":\"US\",\"src_location\":\"San Diego\",\"src_region\":\"California\",\"src_time\":\"Wed Dec 20 14:33:08 2023\",\"src_timezone\":\"America/Los_Angeles\",\"src_zipcode\":\"92110\",\"srcip\":\"144.51.136.197\",\"timestamp\":1703111613,\"traffic_type\":\"CloudApp\",\"transaction_id\":1523448449225732235,\"true_obj_category\":\"Text\",\"true_obj_type\":\"Plain Text file\",\"true_type_id\":2,\"tss_mode\":\"inline\",\"type\":\"nspolicy\",\"ur_normalized\":\"charlie\",\"url\":\"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k\",\"user\":\"charlie\",\"userip\":\"192.168.1.194\",\"userkey\":\"charlie\",\"dynamic_classification\":\"\",\"message_size\":0,\"universal_connector\":\"\",\"displayName\":\"\",\"mime_type\":\"\",\"violating_user\":\"\",\"user_id\":\"\",\"file_cls_encrypted\":false,\"sAMAccountName\":\"\",\"channel\":\"\",\"orignal_file_path\":\"\",\"data_type\":\"\",\"classification_name\":\"\",\"userPrincipalName\":\"\",\"from_storage\":\"\",\"owner_pdl\":\"\",\"group\":\"\",\"total_collaborator_count\":0,\"message_id\":\"\",\"dlp_file\":\"credit_cards.12.db\",\"instance_id\":\"\",\"browser_version\":\"\",\"exposure\":\"\",\"act_user\":\"\",\"dlp_unique_count\":0,\"smtp_to\":[],\"suppression_key\":\"credit_cards.12.db\",\"external_collaborator_count\":0,\"file_category\":\"\",\"collaborated\":\"\",\"manager\":\"\",\"mail\":\"\",\"sub_type\":\"\",\"app_activity\":\"\",\"managementID\":\"\",\"file_path\":\"\",\"to_storage\":\"\",\"dlp_mail_parent_id\":\"\",\"dlp_fingerprint_match\":\"\",\"retro_scan_name\":\"\",\"src_geoip_src\":0,\"userCountry\":\"\",\"file_password_protected\":\"\",\"web_universal_connector\":\"\",\"dlp_fingerprint_score\":0,\"sanctioned_instance\":\"\",\"referer\":\"\",\"parent_id\":\"\",\"title\":\"credit_cards.12.db\",\"to_user\":\"\",\"shared_with\":\"\",\"dst_geoip_src\":0,\"object_id\":\"\",\"from_user\":\"\",\"shared_domains\":\"\",\"instance\":\"\",\"modified\":0,\"true_filetype\":\"\",\"dlp_rule_score\":0,\"dlp_fingerprint_classification\":\"\",\"violating_user_type\":\"\",\"local_sha256\":\"\",\"object\":\"credit_cards.12.db\",\"owner\":\"\",\"bcc\":\"\"} ::: clientIP=144.51.136.197 ::: serverIP=16.31.95.68 ::: fileHashType=sha256 ::: streamName=netskope ::: startTimeUTC=2023-12-20T22:33:33Z ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f",
"messagetype": "data_exfiltration",
"program": "Microsoft OneDrive",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"starttimeutc": "2023-12-20T22:33:33Z",
"tags": [
"data_exfiltration",
"Name-Credit Card (CC)",
"netskope",
"Windows Device(unmanaged)",
"Cloud Storage",
"Microsoft OneDrive",
"DLP PCI Alert",
"DLP-PCI"
],
"streamName": "netskope",
"clientIP": "144.51.136.197",
"serverIP": "16.31.95.68",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: messageType=data_exfiltration ::: userName=charlie ::: clientHostname=Jenga-Surface ::: program=Microsoft OneDrive ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),DLP-PCI,Name-Credit Card (CC)] ::: message={"_id":"c5a301b62ac8d92b330ebb07","access_method":"Client","acked":"false","action":"alert","activity":"Download","alert":"yes","alert_name":"DLP PCI Alert","alert_type":"DLP","app":"Microsoft OneDrive","app_session_id":3483912176895852176,"appcategory":"Cloud Storage","appsuite":"Microsoft Live","browser":"Native","browser_session_id":4752751631097491507,"category":"Cloud Storage","ccl":"high","connection_id":2762431970988418783,"device":"Windows Device","device_classification":"unmanaged","dlp_incident_id":4233141258481957646,"dlp_is_unique_count":"false","dlp_parent_id":4233141258481957646,"dlp_profile":"DLP-PCI","dlp_rule":"Name-Credit Card (CC)","dlp_rule_count":179687,"dlp_rule_severity":"Critical","dst_country":"US","dst_location":"Redmond","dst_region":"Washington","dst_timezone":"America/Los_Angeles","dst_zipcode":"N/A","dstip":"16.31.95.68","file_lang":"ENGLISH","file_size":10256549,"file_type":"text/plain","hostname":"Jenga-Surface","incident_id":1523448449225732235,"managed_app":"yes","md5":"2f6df9969215d9eb4d266dd636337da7","object_type":"File","organization_unit":"","os":"Windows 11","os_version":"Windows 11","outer_doc_type":0,"page":"ahokbw.sn.files.1drv.com","page_site":"Microsoft OneDrive","policy":"DLP PCI Alert","policy_id":"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367","protocol":"HTTPS/1.1","request_id":2735518334081635584,"scan_type":"","severity":"unknown","sha256":"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f","site":"Microsoft OneDrive","src_country":"US","src_location":"San Diego","src_region":"California","src_time":"Wed Dec 20 14:33:08 2023","src_timezone":"America/Los_Angeles","src_zipcode":"92110","srcip":"144.51.136.197","timestamp":1703111613,"traffic_type":"CloudApp","transaction_id":1523448449225732235,"true_obj_category":"Text","true_obj_type":"Plain Text file","true_type_id":2,"tss_mode":"inline","type":"nspolicy","ur_normalized":"charlie","url":"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k","user":"charlie","userip":"192.168.1.194","userkey":"charlie","dynamic_classification":"","message_size":0,"universal_connector":"","displayName":"","mime_type":"","violating_user":"","user_id":"","file_cls_encrypted":false,"sAMAccountName":"","channel":"","orignal_file_path":"","data_type":"","classification_name":"","userPrincipalName":"","from_storage":"","owner_pdl":"","group":"","total_collaborator_count":0,"message_id":"","dlp_file":"credit_cards.12.db","instance_id":"","browser_version":"","exposure":"","act_user":"","dlp_unique_count":0,"smtp_to":[],"suppression_key":"credit_cards.12.db","external_collaborator_count":0,"file_category":"","collaborated":"","manager":"","mail":"","sub_type":"","app_activity":"","managementID":"","file_path":"","to_storage":"","dlp_mail_parent_id":"","dlp_fingerprint_match":"","retro_scan_name":"","src_geoip_src":0,"userCountry":"","file_password_protected":"","web_universal_connector":"","dlp_fingerprint_score":0,"sanctioned_instance":"","referer":"","parent_id":"","title":"credit_cards.12.db","to_user":"","shared_with":"","dst_geoip_src":0,"object_id":"","from_user":"","shared_domains":"","instance":"","modified":0,"true_filetype":"","dlp_rule_score":0,"dlp_fingerprint_classification":"","violating_user_type":"","local_sha256":"","object":"credit_cards.12.db","owner":"","bcc":""} ::: clientIP=144.51.136.197 ::: serverIP=16.31.95.68 ::: fileHashType=sha256 ::: streamName=netskope ::: startTimeUTC=2023-12-20T22:33:33Z ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f | Product: Netskope
Vendor: Netskope | Identify this syslog message |
WitFoo-Artifact ::: messageType=data_exfiltration ::: userName=charlie ::: clientHostname=Jenga-Surface ::: program=Microsoft OneDrive ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),DLP-PCI,Name-Credit Card (CC)] ::: message={"_id":"c5a301b62ac8d92b330ebb07","access_method":"Client","acked":"false","action":"alert","activity":"Download","alert":"yes","alert_name":"DLP PCI Alert","alert_type":"DLP","app":"Microsoft OneDrive","app_session_id":3483912176895852176,"appcategory":"Cloud Storage","appsuite":"Microsoft Live","browser":"Native","browser_session_id":4752751631097491507,"category":"Cloud Storage","ccl":"high","connection_id":2762431970988418783,"device":"Windows Device","device_classification":"unmanaged","dlp_incident_id":4233141258481957646,"dlp_is_unique_count":"false","dlp_parent_id":4233141258481957646,"dlp_profile":"DLP-PCI","dlp_rule":"Name-Credit Card (CC)","dlp_rule_count":179687,"dlp_rule_severity":"Critical","dst_country":"US","dst_location":"Redmond","dst_region":"Washington","dst_timezone":"America/Los_Angeles","dst_zipcode":"N/A","dstip":"16.31.95.68","file_lang":"ENGLISH","file_size":10256549,"file_type":"text/plain","hostname":"Jenga-Surface","incident_id":1523448449225732235,"managed_app":"yes","md5":"2f6df9969215d9eb4d266dd636337da7","object_type":"File","organization_unit":"","os":"Windows 11","os_version":"Windows 11","outer_doc_type":0,"page":"ahokbw.sn.files.1drv.com","page_site":"Microsoft OneDrive","policy":"DLP PCI Alert","policy_id":"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367","protocol":"HTTPS/1.1","request_id":2735518334081635584,"scan_type":"","severity":"unknown","sha256":"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f","site":"Microsoft OneDrive","src_country":"US","src_location":"San Diego","src_region":"California","src_time":"Wed Dec 20 14:33:08 2023","src_timezone":"America/Los_Angeles","src_zipcode":"92110","srcip":"144.51.136.197","timestamp":1703111613,"traffic_type":"CloudApp","transaction_id":1523448449225732235,"true_obj_category":"Text","true_obj_type":"Plain Text file","true_type_id":2,"tss_mode":"inline","type":"nspolicy","ur_normalized":"charlie","url":"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k","user":"charlie","userip":"192.168.1.194","userkey":"charlie","dynamic_classification":"","message_size":0,"universal_connector":"","displayName":"","mime_type":"","violating_user":"","user_id":"","file_cls_encrypted":false,"sAMAccountName":"","channel":"","orignal_file_path":"","data_type":"","classification_name":"","userPrincipalName":"","from_storage":"","owner_pdl":"","group":"","total_collaborator_count":0,"message_id":"","dlp_file":"credit_cards.12.db","instance_id":"","browser_version":"","exposure":"","act_user":"","dlp_unique_count":0,"smtp_to":[],"suppression_key":"credit_cards.12.db","external_collaborator_count":0,"file_category":"","collaborated":"","manager":"","mail":"","sub_type":"","app_activity":"","managementID":"","file_path":"","to_storage":"","dlp_mail_parent_id":"","dlp_fingerprint_match":"","retro_scan_name":"","src_geoip_src":0,"userCountry":"","file_password_protected":"","web_universal_connector":"","dlp_fingerprint_score":0,"sanctioned_instance":"","referer":"","parent_id":"","title":"credit_cards.12.db","to_user":"","shared_with":"","dst_geoip_src":0,"object_id":"","from_user":"","shared_domains":"","instance":"","modified":0,"true_filetype":"","dlp_rule_score":0,"dlp_fingerprint_classification":"","violating_user_type":"","local_sha256":"","object":"credit_cards.12.db","owner":"","bcc":""} ::: clientIP=144.51.136.197 ::: serverIP=16.31.95.68 ::: fileHashType=sha256 ::: streamName=netskope ::: startTimeUTC=2023-12-20T22:33:33Z ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f | This is a syslog message from a product called Netskope by Netskope. The following fields were extracted from the message:
clienthostname: Jenga-Surface
filehash: 26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f
messagetype: data_exfiltration
program: Microsoft OneDrive
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
starttimeutc: 2023-12-20T22:33:33Z
tags: ['data_exfiltration', 'Name-Credit Card (CC)', 'netskope', 'Windows Device(unmanaged)', 'Cloud Storage', 'Microsoft OneDrive', 'DLP PCI Alert', 'DLP-PCI']
streamName: netskope
clientIP: 144.51.136.197
serverIP: 16.31.95.68
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f ::: program=Microsoft OneDrive ::: message={"_id":"a533abc31101969f3a41697c","access_method":"Client","acked":"false","action":"alert","activity":"Download","alert":"yes","alert_name":"DLP PCI Alert","alert_type":"DLP","app":"Microsoft OneDrive","app_session_id":3483912176895852176,"appcategory":"Cloud Storage","appsuite":"Microsoft Live","browser":"Native","browser_session_id":4752751631097491507,"category":"Cloud Storage","ccl":"high","connection_id":2762431970988418783,"device":"Windows Device","device_classification":"unmanaged","dlp_incident_id":4233141258481957646,"dlp_is_unique_count":"false","dlp_parent_id":4233141258481957646,"dlp_profile":"Payment Card Industry Data Security Standard. PCI-DSS","dlp_rule":"INTL-PAN-Name","dlp_rule_count":14375,"dlp_rule_severity":"Critical","dst_country":"US","dst_location":"Redmond","dst_region":"Washington","dst_timezone":"America/Los_Angeles","dst_zipcode":"N/A","dstip":"211.187.88.142","file_lang":"ENGLISH","file_size":10256549,"file_type":"text/plain","hostname":"Jenga-Surface","incident_id":1523448449225732235,"managed_app":"yes","md5":"2f6df9969215d9eb4d266dd636337da7","object_type":"File","organization_unit":"","os":"Windows 11","os_version":"Windows 11","outer_doc_type":0,"page":"ahokbw.sn.files.1drv.com","page_site":"Microsoft OneDrive","policy":"DLP PCI Alert","policy_id":"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367","protocol":"HTTPS/1.1","request_id":2735518334081635584,"scan_type":"","severity":"unknown","sha256":"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f","site":"Microsoft OneDrive","src_country":"US","src_location":"San Diego","src_region":"California","src_time":"Wed Dec 20 14:33:08 2023","src_timezone":"America/Los_Angeles","src_zipcode":"92110","srcip":"134.239.215.2","timestamp":1703111613,"traffic_type":"CloudApp","transaction_id":1523448449225732235,"true_obj_category":"Text","true_obj_type":"Plain Text file","true_type_id":2,"tss_mode":"inline","type":"nspolicy","ur_normalized":"alice","url":"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k","user":"alice","userip":"192.168.1.194","userkey":"alice","dynamic_classification":"","message_size":0,"universal_connector":"","displayName":"","mime_type":"","violating_user":"","user_id":"","file_cls_encrypted":false,"sAMAccountName":"","channel":"","orignal_file_path":"","data_type":"","classification_name":"","userPrincipalName":"","from_storage":"","owner_pdl":"","group":"","total_collaborator_count":0,"message_id":"","dlp_file":"credit_cards.12.db","instance_id":"","browser_version":"","exposure":"","act_user":"","dlp_unique_count":0,"smtp_to":[],"suppression_key":"credit_cards.12.db","external_collaborator_count":0,"file_category":"","collaborated":"","manager":"","mail":"","sub_type":"","app_activity":"","managementID":"","file_path":"","to_storage":"","dlp_mail_parent_id":"","dlp_fingerprint_match":"","retro_scan_name":"","src_geoip_src":0,"userCountry":"","file_password_protected":"","web_universal_connector":"","dlp_fingerprint_score":0,"sanctioned_instance":"","referer":"","parent_id":"","title":"credit_cards.12.db","to_user":"","shared_with":"","dst_geoip_src":0,"object_id":"","from_user":"","shared_domains":"","instance":"","modified":0,"true_filetype":"","dlp_rule_score":0,"dlp_fingerprint_classification":"","violating_user_type":"","local_sha256":"","object":"credit_cards.12.db","owner":"","bcc":""} ::: fileHashType=sha256 ::: clientHostname=Jenga-Surface ::: startTimeUTC=2023-12-20T22:33:33Z ::: streamName=netskope ::: messageType=data_exfiltration ::: serverIP=211.187.88.142 ::: userName=alice ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),Payment Card Industry Data Security Standard. PCI-DSS,INTL-PAN-Name] ::: clientIP=134.239.215.2 | {
"clienthostname": "Jenga-Surface",
"filehash": "26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f",
"message": "WitFoo-Artifact ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f ::: program=Microsoft OneDrive ::: message={\"_id\":\"a533abc31101969f3a41697c\",\"access_method\":\"Client\",\"acked\":\"false\",\"action\":\"alert\",\"activity\":\"Download\",\"alert\":\"yes\",\"alert_name\":\"DLP PCI Alert\",\"alert_type\":\"DLP\",\"app\":\"Microsoft OneDrive\",\"app_session_id\":3483912176895852176,\"appcategory\":\"Cloud Storage\",\"appsuite\":\"Microsoft Live\",\"browser\":\"Native\",\"browser_session_id\":4752751631097491507,\"category\":\"Cloud Storage\",\"ccl\":\"high\",\"connection_id\":2762431970988418783,\"device\":\"Windows Device\",\"device_classification\":\"unmanaged\",\"dlp_incident_id\":4233141258481957646,\"dlp_is_unique_count\":\"false\",\"dlp_parent_id\":4233141258481957646,\"dlp_profile\":\"Payment Card Industry Data Security Standard. PCI-DSS\",\"dlp_rule\":\"INTL-PAN-Name\",\"dlp_rule_count\":14375,\"dlp_rule_severity\":\"Critical\",\"dst_country\":\"US\",\"dst_location\":\"Redmond\",\"dst_region\":\"Washington\",\"dst_timezone\":\"America/Los_Angeles\",\"dst_zipcode\":\"N/A\",\"dstip\":\"211.187.88.142\",\"file_lang\":\"ENGLISH\",\"file_size\":10256549,\"file_type\":\"text/plain\",\"hostname\":\"Jenga-Surface\",\"incident_id\":1523448449225732235,\"managed_app\":\"yes\",\"md5\":\"2f6df9969215d9eb4d266dd636337da7\",\"object_type\":\"File\",\"organization_unit\":\"\",\"os\":\"Windows 11\",\"os_version\":\"Windows 11\",\"outer_doc_type\":0,\"page\":\"ahokbw.sn.files.1drv.com\",\"page_site\":\"Microsoft OneDrive\",\"policy\":\"DLP PCI Alert\",\"policy_id\":\"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367\",\"protocol\":\"HTTPS/1.1\",\"request_id\":2735518334081635584,\"scan_type\":\"\",\"severity\":\"unknown\",\"sha256\":\"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f\",\"site\":\"Microsoft OneDrive\",\"src_country\":\"US\",\"src_location\":\"San Diego\",\"src_region\":\"California\",\"src_time\":\"Wed Dec 20 14:33:08 2023\",\"src_timezone\":\"America/Los_Angeles\",\"src_zipcode\":\"92110\",\"srcip\":\"134.239.215.2\",\"timestamp\":1703111613,\"traffic_type\":\"CloudApp\",\"transaction_id\":1523448449225732235,\"true_obj_category\":\"Text\",\"true_obj_type\":\"Plain Text file\",\"true_type_id\":2,\"tss_mode\":\"inline\",\"type\":\"nspolicy\",\"ur_normalized\":\"alice\",\"url\":\"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k\",\"user\":\"alice\",\"userip\":\"192.168.1.194\",\"userkey\":\"alice\",\"dynamic_classification\":\"\",\"message_size\":0,\"universal_connector\":\"\",\"displayName\":\"\",\"mime_type\":\"\",\"violating_user\":\"\",\"user_id\":\"\",\"file_cls_encrypted\":false,\"sAMAccountName\":\"\",\"channel\":\"\",\"orignal_file_path\":\"\",\"data_type\":\"\",\"classification_name\":\"\",\"userPrincipalName\":\"\",\"from_storage\":\"\",\"owner_pdl\":\"\",\"group\":\"\",\"total_collaborator_count\":0,\"message_id\":\"\",\"dlp_file\":\"credit_cards.12.db\",\"instance_id\":\"\",\"browser_version\":\"\",\"exposure\":\"\",\"act_user\":\"\",\"dlp_unique_count\":0,\"smtp_to\":[],\"suppression_key\":\"credit_cards.12.db\",\"external_collaborator_count\":0,\"file_category\":\"\",\"collaborated\":\"\",\"manager\":\"\",\"mail\":\"\",\"sub_type\":\"\",\"app_activity\":\"\",\"managementID\":\"\",\"file_path\":\"\",\"to_storage\":\"\",\"dlp_mail_parent_id\":\"\",\"dlp_fingerprint_match\":\"\",\"retro_scan_name\":\"\",\"src_geoip_src\":0,\"userCountry\":\"\",\"file_password_protected\":\"\",\"web_universal_connector\":\"\",\"dlp_fingerprint_score\":0,\"sanctioned_instance\":\"\",\"referer\":\"\",\"parent_id\":\"\",\"title\":\"credit_cards.12.db\",\"to_user\":\"\",\"shared_with\":\"\",\"dst_geoip_src\":0,\"object_id\":\"\",\"from_user\":\"\",\"shared_domains\":\"\",\"instance\":\"\",\"modified\":0,\"true_filetype\":\"\",\"dlp_rule_score\":0,\"dlp_fingerprint_classification\":\"\",\"violating_user_type\":\"\",\"local_sha256\":\"\",\"object\":\"credit_cards.12.db\",\"owner\":\"\",\"bcc\":\"\"} ::: fileHashType=sha256 ::: clientHostname=Jenga-Surface ::: startTimeUTC=2023-12-20T22:33:33Z ::: streamName=netskope ::: messageType=data_exfiltration ::: serverIP=211.187.88.142 ::: userName=alice ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),Payment Card Industry Data Security Standard. PCI-DSS,INTL-PAN-Name] ::: clientIP=134.239.215.2",
"messagetype": "data_exfiltration",
"program": "Microsoft OneDrive",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"starttimeutc": "2023-12-20T22:33:33Z",
"tags": [
"data_exfiltration",
"netskope",
"INTL-PAN-Name",
"Payment Card Industry Data Security Standard. PCI-DSS",
"Windows Device(unmanaged)",
"DLP PCI Alert",
"Cloud Storage",
"Microsoft OneDrive"
],
"streamName": "netskope",
"clientIP": "134.239.215.2",
"serverIP": "211.187.88.142",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f ::: program=Microsoft OneDrive ::: message={"_id":"a533abc31101969f3a41697c","access_method":"Client","acked":"false","action":"alert","activity":"Download","alert":"yes","alert_name":"DLP PCI Alert","alert_type":"DLP","app":"Microsoft OneDrive","app_session_id":3483912176895852176,"appcategory":"Cloud Storage","appsuite":"Microsoft Live","browser":"Native","browser_session_id":4752751631097491507,"category":"Cloud Storage","ccl":"high","connection_id":2762431970988418783,"device":"Windows Device","device_classification":"unmanaged","dlp_incident_id":4233141258481957646,"dlp_is_unique_count":"false","dlp_parent_id":4233141258481957646,"dlp_profile":"Payment Card Industry Data Security Standard. PCI-DSS","dlp_rule":"INTL-PAN-Name","dlp_rule_count":14375,"dlp_rule_severity":"Critical","dst_country":"US","dst_location":"Redmond","dst_region":"Washington","dst_timezone":"America/Los_Angeles","dst_zipcode":"N/A","dstip":"211.187.88.142","file_lang":"ENGLISH","file_size":10256549,"file_type":"text/plain","hostname":"Jenga-Surface","incident_id":1523448449225732235,"managed_app":"yes","md5":"2f6df9969215d9eb4d266dd636337da7","object_type":"File","organization_unit":"","os":"Windows 11","os_version":"Windows 11","outer_doc_type":0,"page":"ahokbw.sn.files.1drv.com","page_site":"Microsoft OneDrive","policy":"DLP PCI Alert","policy_id":"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367","protocol":"HTTPS/1.1","request_id":2735518334081635584,"scan_type":"","severity":"unknown","sha256":"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f","site":"Microsoft OneDrive","src_country":"US","src_location":"San Diego","src_region":"California","src_time":"Wed Dec 20 14:33:08 2023","src_timezone":"America/Los_Angeles","src_zipcode":"92110","srcip":"134.239.215.2","timestamp":1703111613,"traffic_type":"CloudApp","transaction_id":1523448449225732235,"true_obj_category":"Text","true_obj_type":"Plain Text file","true_type_id":2,"tss_mode":"inline","type":"nspolicy","ur_normalized":"alice","url":"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k","user":"alice","userip":"192.168.1.194","userkey":"alice","dynamic_classification":"","message_size":0,"universal_connector":"","displayName":"","mime_type":"","violating_user":"","user_id":"","file_cls_encrypted":false,"sAMAccountName":"","channel":"","orignal_file_path":"","data_type":"","classification_name":"","userPrincipalName":"","from_storage":"","owner_pdl":"","group":"","total_collaborator_count":0,"message_id":"","dlp_file":"credit_cards.12.db","instance_id":"","browser_version":"","exposure":"","act_user":"","dlp_unique_count":0,"smtp_to":[],"suppression_key":"credit_cards.12.db","external_collaborator_count":0,"file_category":"","collaborated":"","manager":"","mail":"","sub_type":"","app_activity":"","managementID":"","file_path":"","to_storage":"","dlp_mail_parent_id":"","dlp_fingerprint_match":"","retro_scan_name":"","src_geoip_src":0,"userCountry":"","file_password_protected":"","web_universal_connector":"","dlp_fingerprint_score":0,"sanctioned_instance":"","referer":"","parent_id":"","title":"credit_cards.12.db","to_user":"","shared_with":"","dst_geoip_src":0,"object_id":"","from_user":"","shared_domains":"","instance":"","modified":0,"true_filetype":"","dlp_rule_score":0,"dlp_fingerprint_classification":"","violating_user_type":"","local_sha256":"","object":"credit_cards.12.db","owner":"","bcc":""} ::: fileHashType=sha256 ::: clientHostname=Jenga-Surface ::: startTimeUTC=2023-12-20T22:33:33Z ::: streamName=netskope ::: messageType=data_exfiltration ::: serverIP=211.187.88.142 ::: userName=alice ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),Payment Card Industry Data Security Standard. PCI-DSS,INTL-PAN-Name] ::: clientIP=134.239.215.2 | Product: Netskope
Vendor: Netskope | Identify this syslog message |
WitFoo-Artifact ::: fileHash=26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f ::: program=Microsoft OneDrive ::: message={"_id":"a533abc31101969f3a41697c","access_method":"Client","acked":"false","action":"alert","activity":"Download","alert":"yes","alert_name":"DLP PCI Alert","alert_type":"DLP","app":"Microsoft OneDrive","app_session_id":3483912176895852176,"appcategory":"Cloud Storage","appsuite":"Microsoft Live","browser":"Native","browser_session_id":4752751631097491507,"category":"Cloud Storage","ccl":"high","connection_id":2762431970988418783,"device":"Windows Device","device_classification":"unmanaged","dlp_incident_id":4233141258481957646,"dlp_is_unique_count":"false","dlp_parent_id":4233141258481957646,"dlp_profile":"Payment Card Industry Data Security Standard. PCI-DSS","dlp_rule":"INTL-PAN-Name","dlp_rule_count":14375,"dlp_rule_severity":"Critical","dst_country":"US","dst_location":"Redmond","dst_region":"Washington","dst_timezone":"America/Los_Angeles","dst_zipcode":"N/A","dstip":"211.187.88.142","file_lang":"ENGLISH","file_size":10256549,"file_type":"text/plain","hostname":"Jenga-Surface","incident_id":1523448449225732235,"managed_app":"yes","md5":"2f6df9969215d9eb4d266dd636337da7","object_type":"File","organization_unit":"","os":"Windows 11","os_version":"Windows 11","outer_doc_type":0,"page":"ahokbw.sn.files.1drv.com","page_site":"Microsoft OneDrive","policy":"DLP PCI Alert","policy_id":"917683231580654373C0849096058D6E 2023-11-22 11:22:06.688367","protocol":"HTTPS/1.1","request_id":2735518334081635584,"scan_type":"","severity":"unknown","sha256":"26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f","site":"Microsoft OneDrive","src_country":"US","src_location":"San Diego","src_region":"California","src_time":"Wed Dec 20 14:33:08 2023","src_timezone":"America/Los_Angeles","src_zipcode":"92110","srcip":"134.239.215.2","timestamp":1703111613,"traffic_type":"CloudApp","transaction_id":1523448449225732235,"true_obj_category":"Text","true_obj_type":"Plain Text file","true_type_id":2,"tss_mode":"inline","type":"nspolicy","ur_normalized":"alice","url":"ahokbw.sn.files.1drv.com/y4pjpgKTqpQltjYaPUVp8c4C7k1RPR1Ijs-eXlAB_BFH3Q8q0wANMEsWuGk5OB2MrAexKOYas2VLGzl-DRmyayHFQXeVXJlS1ggc-PMzlmVRMWdTSzFI5SjNfTU2xMf-MvDOgrJ9W5H5RMnE1tpvWID3sI6OG_6pjRVspm4ugkYPDFSx9H4R-FrsalyUD29u698OVdP929_uQdf9zgpu5Xm5UYQXny6kTuf0MlRGSCnZ9k","user":"alice","userip":"192.168.1.194","userkey":"alice","dynamic_classification":"","message_size":0,"universal_connector":"","displayName":"","mime_type":"","violating_user":"","user_id":"","file_cls_encrypted":false,"sAMAccountName":"","channel":"","orignal_file_path":"","data_type":"","classification_name":"","userPrincipalName":"","from_storage":"","owner_pdl":"","group":"","total_collaborator_count":0,"message_id":"","dlp_file":"credit_cards.12.db","instance_id":"","browser_version":"","exposure":"","act_user":"","dlp_unique_count":0,"smtp_to":[],"suppression_key":"credit_cards.12.db","external_collaborator_count":0,"file_category":"","collaborated":"","manager":"","mail":"","sub_type":"","app_activity":"","managementID":"","file_path":"","to_storage":"","dlp_mail_parent_id":"","dlp_fingerprint_match":"","retro_scan_name":"","src_geoip_src":0,"userCountry":"","file_password_protected":"","web_universal_connector":"","dlp_fingerprint_score":0,"sanctioned_instance":"","referer":"","parent_id":"","title":"credit_cards.12.db","to_user":"","shared_with":"","dst_geoip_src":0,"object_id":"","from_user":"","shared_domains":"","instance":"","modified":0,"true_filetype":"","dlp_rule_score":0,"dlp_fingerprint_classification":"","violating_user_type":"","local_sha256":"","object":"credit_cards.12.db","owner":"","bcc":""} ::: fileHashType=sha256 ::: clientHostname=Jenga-Surface ::: startTimeUTC=2023-12-20T22:33:33Z ::: streamName=netskope ::: messageType=data_exfiltration ::: serverIP=211.187.88.142 ::: userName=alice ::: tags=[DLP PCI Alert,Microsoft OneDrive,Cloud Storage,Windows Device(unmanaged),Payment Card Industry Data Security Standard. PCI-DSS,INTL-PAN-Name] ::: clientIP=134.239.215.2 | This is a syslog message from a product called Netskope by Netskope. The following fields were extracted from the message:
clienthostname: Jenga-Surface
filehash: 26a8440588af2c3c061722ac27669504944c74eb89cb68ecd074ed5a56b07c7f
messagetype: data_exfiltration
program: Microsoft OneDrive
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
starttimeutc: 2023-12-20T22:33:33Z
tags: ['data_exfiltration', 'netskope', 'INTL-PAN-Name', 'Payment Card Industry Data Security Standard. PCI-DSS', 'Windows Device(unmanaged)', 'DLP PCI Alert', 'Cloud Storage', 'Microsoft OneDrive']
streamName: netskope
clientIP: 134.239.215.2
serverIP: 211.187.88.142
userName: alice | Explain this syslog message |
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=98.223.177.43 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=42.195.62.149 dst=98.223.177.43 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1552 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 443,
"severitylabel": "emergency",
"tags": [
"TCP Flags:ACK PSH",
"DPI Note:CVE-2010-2730",
"trend micro_deep security agent_Request Header Buffer Overflow Vulnerability",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"Request Header Buffer Overflow Vulnerability",
"trend micro_deep security agent",
"DPI Stream Position :0"
],
"productids": [
30
],
"sourceinfo": "unknown",
"message": "<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=98.223.177.43 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=42.195.62.149 dst=98.223.177.43 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1552 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2010-2730\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Oct 5 16:46:37",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Request Header Buffer Overflow Vulnerability",
"servermac": "0ABBAEEE7AE1",
"clientmac": "0A5FBF1DBD89",
"clientport": 1710,
"vendorcode": "1004398",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "42.195.62.149",
"serverIP": "98.223.177.43"
} | Create a JSON artifact from the message |
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=98.223.177.43 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=42.195.62.149 dst=98.223.177.43 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1552 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=98.223.177.43 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=42.195.62.149 dst=98.223.177.43 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1552 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 443
severitylabel: emergency
tags: ['TCP Flags:ACK PSH', 'DPI Note:CVE-2010-2730', 'trend micro_deep security agent_Request Header Buffer Overflow Vulnerability', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'Request Header Buffer Overflow Vulnerability', 'trend micro_deep security agent', 'DPI Stream Position :0']
productids: [30]
sourceinfo: unknown
localstarttime: Oct 5 16:46:37
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Request Header Buffer Overflow Vulnerability
servermac: 0ABBAEEE7AE1
clientmac: 0A5FBF1DBD89
clientport: 1710
vendorcode: 1004398
action: IDS:Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 42.195.62.149
serverIP: 98.223.177.43 | Explain this syslog message |
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=233.25.222.169 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=111.153.140.74 dst=233.25.222.169 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=402 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 443,
"severitylabel": "emergency",
"tags": [
"TCP Flags:ACK PSH",
"trend micro_deep security agent_Request Header Buffer Overflow Vulnerability",
"DPI Note:CVE-2010-2730-1",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"Request Header Buffer Overflow Vulnerability",
"trend micro_deep security agent",
"DPI Stream Position :0"
],
"productids": [
30
],
"sourceinfo": "unknown",
"message": "<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=233.25.222.169 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=111.153.140.74 dst=233.25.222.169 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=402 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2010-2730-1\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Oct 5 16:51:55",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Request Header Buffer Overflow Vulnerability",
"servermac": "0ABBAEEE7AE1",
"clientmac": "0A5FBF1DBD89",
"clientport": 1538,
"vendorcode": "1004398",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "111.153.140.74",
"serverIP": "233.25.222.169"
} | Create a JSON artifact from the message |
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=233.25.222.169 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=111.153.140.74 dst=233.25.222.169 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=402 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=233.25.222.169 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=111.153.140.74 dst=233.25.222.169 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=402 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 443
severitylabel: emergency
tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Request Header Buffer Overflow Vulnerability', 'DPI Note:CVE-2010-2730-1', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'Request Header Buffer Overflow Vulnerability', 'trend micro_deep security agent', 'DPI Stream Position :0']
productids: [30]
sourceinfo: unknown
localstarttime: Oct 5 16:51:55
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Request Header Buffer Overflow Vulnerability
servermac: 0ABBAEEE7AE1
clientmac: 0A5FBF1DBD89
clientport: 1538
vendorcode: 1004398
action: IDS:Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 111.153.140.74
serverIP: 233.25.222.169 | Explain this syslog message |
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=101.20.31.120 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=16.39.150.35 dst=101.20.31.120 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=621 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 443,
"severitylabel": "emergency",
"tags": [
"TCP Flags:ACK PSH",
"trend micro_deep security agent_Request Header Buffer Overflow Vulnerability",
"DPI Note:CVE-2010-2730-1",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"Request Header Buffer Overflow Vulnerability",
"trend micro_deep security agent",
"DPI Stream Position :0"
],
"productids": [
30
],
"sourceinfo": "unknown",
"message": "<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=101.20.31.120 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=16.39.150.35 dst=101.20.31.120 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=621 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2010-2730-1\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Oct 5 16:46:37",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Request Header Buffer Overflow Vulnerability",
"servermac": "0ABBAEEE7AE1",
"clientmac": "0A5FBF1DBD89",
"clientport": 1710,
"vendorcode": "1004398",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "16.39.150.35",
"serverIP": "101.20.31.120"
} | Create a JSON artifact from the message |
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=101.20.31.120 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=16.39.150.35 dst=101.20.31.120 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=621 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=101.20.31.120 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=16.39.150.35 dst=101.20.31.120 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=621 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 443
severitylabel: emergency
tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Request Header Buffer Overflow Vulnerability', 'DPI Note:CVE-2010-2730-1', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'Request Header Buffer Overflow Vulnerability', 'trend micro_deep security agent', 'DPI Stream Position :0']
productids: [30]
sourceinfo: unknown
localstarttime: Oct 5 16:46:37
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Request Header Buffer Overflow Vulnerability
servermac: 0ABBAEEE7AE1
clientmac: 0A5FBF1DBD89
clientport: 1710
vendorcode: 1004398
action: IDS:Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 16.39.150.35
serverIP: 101.20.31.120 | Explain this syslog message |
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=121.220.226.166 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=13.25.238.205 dst=121.220.226.166 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1119 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 443,
"severitylabel": "emergency",
"tags": [
"TCP Flags:ACK PSH",
"DPI Note:CVE-2010-2730",
"trend micro_deep security agent_Request Header Buffer Overflow Vulnerability",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"Request Header Buffer Overflow Vulnerability",
"trend micro_deep security agent",
"DPI Stream Position :0"
],
"productids": [
30
],
"sourceinfo": "unknown",
"message": "<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=121.220.226.166 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=13.25.238.205 dst=121.220.226.166 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1119 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2010-2730\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Oct 5 16:51:55",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Request Header Buffer Overflow Vulnerability",
"servermac": "0ABBAEEE7AE1",
"clientmac": "0A5FBF1DBD89",
"clientport": 1538,
"vendorcode": "1004398",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "13.25.238.205",
"serverIP": "121.220.226.166"
} | Create a JSON artifact from the message |
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=121.220.226.166 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=13.25.238.205 dst=121.220.226.166 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1119 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=121.220.226.166 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=13.25.238.205 dst=121.220.226.166 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1119 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 443
severitylabel: emergency
tags: ['TCP Flags:ACK PSH', 'DPI Note:CVE-2010-2730', 'trend micro_deep security agent_Request Header Buffer Overflow Vulnerability', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'Request Header Buffer Overflow Vulnerability', 'trend micro_deep security agent', 'DPI Stream Position :0']
productids: [30]
sourceinfo: unknown
localstarttime: Oct 5 16:51:55
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Request Header Buffer Overflow Vulnerability
servermac: 0ABBAEEE7AE1
clientmac: 0A5FBF1DBD89
clientport: 1538
vendorcode: 1004398
action: IDS:Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 13.25.238.205
serverIP: 121.220.226.166 | Explain this syslog message |
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=47.189.165.200 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=196.68.60.174 dst=47.189.165.200 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1552 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 443,
"severitylabel": "emergency",
"tags": [
"TCP Flags:ACK PSH",
"DPI Note:CVE-2010-2730",
"trend micro_deep security agent_Request Header Buffer Overflow Vulnerability",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"Request Header Buffer Overflow Vulnerability",
"trend micro_deep security agent",
"DPI Stream Position :0"
],
"productids": [
30
],
"sourceinfo": "unknown",
"message": "<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=47.189.165.200 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=196.68.60.174 dst=47.189.165.200 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1552 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2010-2730\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Oct 5 16:46:37",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Request Header Buffer Overflow Vulnerability",
"servermac": "0ABBAEEE7AE1",
"clientmac": "0A5FBF1DBD89",
"clientport": 1710,
"vendorcode": "1004398",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "196.68.60.174",
"serverIP": "47.189.165.200"
} | Create a JSON artifact from the message |
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=47.189.165.200 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=196.68.60.174 dst=47.189.165.200 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1552 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=47.189.165.200 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=196.68.60.174 dst=47.189.165.200 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1552 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 443
severitylabel: emergency
tags: ['TCP Flags:ACK PSH', 'DPI Note:CVE-2010-2730', 'trend micro_deep security agent_Request Header Buffer Overflow Vulnerability', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'Request Header Buffer Overflow Vulnerability', 'trend micro_deep security agent', 'DPI Stream Position :0']
productids: [30]
sourceinfo: unknown
localstarttime: Oct 5 16:46:37
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Request Header Buffer Overflow Vulnerability
servermac: 0ABBAEEE7AE1
clientmac: 0A5FBF1DBD89
clientport: 1710
vendorcode: 1004398
action: IDS:Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 196.68.60.174
serverIP: 47.189.165.200 | Explain this syslog message |
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=191.33.4.216 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=201.167.94.16 dst=191.33.4.216 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=402 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 443,
"severitylabel": "emergency",
"tags": [
"TCP Flags:ACK PSH",
"trend micro_deep security agent_Request Header Buffer Overflow Vulnerability",
"DPI Note:CVE-2010-2730-1",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"Request Header Buffer Overflow Vulnerability",
"trend micro_deep security agent",
"DPI Stream Position :0"
],
"productids": [
30
],
"sourceinfo": "unknown",
"message": "<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=191.33.4.216 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=201.167.94.16 dst=191.33.4.216 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=402 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2010-2730-1\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Oct 5 16:51:55",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Request Header Buffer Overflow Vulnerability",
"servermac": "0ABBAEEE7AE1",
"clientmac": "0A5FBF1DBD89",
"clientport": 1538,
"vendorcode": "1004398",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "201.167.94.16",
"serverIP": "191.33.4.216"
} | Create a JSON artifact from the message |
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=191.33.4.216 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=201.167.94.16 dst=191.33.4.216 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=402 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=191.33.4.216 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=201.167.94.16 dst=191.33.4.216 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=402 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 443
severitylabel: emergency
tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Request Header Buffer Overflow Vulnerability', 'DPI Note:CVE-2010-2730-1', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'Request Header Buffer Overflow Vulnerability', 'trend micro_deep security agent', 'DPI Stream Position :0']
productids: [30]
sourceinfo: unknown
localstarttime: Oct 5 16:51:55
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Request Header Buffer Overflow Vulnerability
servermac: 0ABBAEEE7AE1
clientmac: 0A5FBF1DBD89
clientport: 1538
vendorcode: 1004398
action: IDS:Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 201.167.94.16
serverIP: 191.33.4.216 | Explain this syslog message |
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=63.158.154.31 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=87.19.236.5 dst=63.158.154.31 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=621 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 443,
"severitylabel": "emergency",
"tags": [
"TCP Flags:ACK PSH",
"trend micro_deep security agent_Request Header Buffer Overflow Vulnerability",
"DPI Note:CVE-2010-2730-1",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"Request Header Buffer Overflow Vulnerability",
"trend micro_deep security agent",
"DPI Stream Position :0"
],
"productids": [
30
],
"sourceinfo": "unknown",
"message": "<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=63.158.154.31 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=87.19.236.5 dst=63.158.154.31 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=621 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2010-2730-1\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Oct 5 16:46:37",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Request Header Buffer Overflow Vulnerability",
"servermac": "0ABBAEEE7AE1",
"clientmac": "0A5FBF1DBD89",
"clientport": 1710,
"vendorcode": "1004398",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "87.19.236.5",
"serverIP": "63.158.154.31"
} | Create a JSON artifact from the message |
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=63.158.154.31 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=87.19.236.5 dst=63.158.154.31 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=621 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 5 16:46:37 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=63.158.154.31 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=87.19.236.5 dst=63.158.154.31 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1710 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=621 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 443
severitylabel: emergency
tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Request Header Buffer Overflow Vulnerability', 'DPI Note:CVE-2010-2730-1', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'Request Header Buffer Overflow Vulnerability', 'trend micro_deep security agent', 'DPI Stream Position :0']
productids: [30]
sourceinfo: unknown
localstarttime: Oct 5 16:46:37
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Request Header Buffer Overflow Vulnerability
servermac: 0ABBAEEE7AE1
clientmac: 0A5FBF1DBD89
clientport: 1710
vendorcode: 1004398
action: IDS:Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 87.19.236.5
serverIP: 63.158.154.31 | Explain this syslog message |
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=123.103.118.190 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=53.192.39.62 dst=123.103.118.190 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1119 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 443,
"severitylabel": "emergency",
"tags": [
"TCP Flags:ACK PSH",
"DPI Note:CVE-2010-2730",
"trend micro_deep security agent_Request Header Buffer Overflow Vulnerability",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"Request Header Buffer Overflow Vulnerability",
"trend micro_deep security agent",
"DPI Stream Position :0"
],
"productids": [
30
],
"sourceinfo": "unknown",
"message": "<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=123.103.118.190 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=53.192.39.62 dst=123.103.118.190 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1119 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2010-2730\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Oct 5 16:51:55",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Request Header Buffer Overflow Vulnerability",
"servermac": "0ABBAEEE7AE1",
"clientmac": "0A5FBF1DBD89",
"clientport": 1538,
"vendorcode": "1004398",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "53.192.39.62",
"serverIP": "123.103.118.190"
} | Create a JSON artifact from the message |
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=123.103.118.190 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=53.192.39.62 dst=123.103.118.190 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1119 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 5 16:51:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=123.103.118.190 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:5F:BF:1D:BD:89 TrendMicroDsFrameType=IP src=53.192.39.62 dst=123.103.118.190 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1538 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1119 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 443
severitylabel: emergency
tags: ['TCP Flags:ACK PSH', 'DPI Note:CVE-2010-2730', 'trend micro_deep security agent_Request Header Buffer Overflow Vulnerability', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'Request Header Buffer Overflow Vulnerability', 'trend micro_deep security agent', 'DPI Stream Position :0']
productids: [30]
sourceinfo: unknown
localstarttime: Oct 5 16:51:55
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Request Header Buffer Overflow Vulnerability
servermac: 0ABBAEEE7AE1
clientmac: 0A5FBF1DBD89
clientport: 1538
vendorcode: 1004398
action: IDS:Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 53.192.39.62
serverIP: 123.103.118.190 | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=209.198.200.228 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"150.145.104.31","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"209.198.200.228","location":{"city":"Pestarktree Corners","country":"United States","state":"Georgia"},"name":"678-768-5994"},"email":"charlie@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-27T12:10:29.538097+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661602229,"txid":"70ae84fa-2277-4131-ae6f-ebabcfba7a7a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUWS81USLCNBRNQC3W9Y","name":"charlie"}} ::: program=null ::: clientIP=150.145.104.31 ::: userName=charlie ::: created_at=1661602229 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661602229 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1661602229",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "209.198.200.228",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS02",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=209.198.200.228 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"150.145.104.31\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"209.198.200.228\",\"location\":{\"city\":\"Pestarktree Corners\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"678-768-5994\"},\"email\":\"charlie@stark.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-27T12:10:29.538097+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1661602229,\"txid\":\"70ae84fa-2277-4131-ae6f-ebabcfba7a7a\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUWS81USLCNBRNQC3W9Y\",\"name\":\"charlie\"}} ::: program=null ::: clientIP=150.145.104.31 ::: userName=charlie ::: created_at=1661602229 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661602229 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "150.145.104.31",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=209.198.200.228 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"150.145.104.31","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"209.198.200.228","location":{"city":"Pestarktree Corners","country":"United States","state":"Georgia"},"name":"678-768-5994"},"email":"charlie@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-27T12:10:29.538097+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661602229,"txid":"70ae84fa-2277-4131-ae6f-ebabcfba7a7a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUWS81USLCNBRNQC3W9Y","name":"charlie"}} ::: program=null ::: clientIP=150.145.104.31 ::: userName=charlie ::: created_at=1661602229 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661602229 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=209.198.200.228 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"150.145.104.31","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"209.198.200.228","location":{"city":"Pestarktree Corners","country":"United States","state":"Georgia"},"name":"678-768-5994"},"email":"charlie@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-27T12:10:29.538097+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661602229,"txid":"70ae84fa-2277-4131-ae6f-ebabcfba7a7a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUWS81USLCNBRNQC3W9Y","name":"charlie"}} ::: program=null ::: clientIP=150.145.104.31 ::: userName=charlie ::: created_at=1661602229 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661602229 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1661602229
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 209.198.200.228
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS02
streamName: DUO
clientIP: 150.145.104.31
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=209.198.200.228 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"77.109.152.118","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"209.198.200.228","location":{"city":"Peoscorptree Corners","country":"United States","state":"Georgia"},"name":"678-768-5994"},"email":"charlie@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-27T12:10:29.538097+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661602229,"txid":"70ae84fa-2277-4131-ae6f-ebabcfba7a7a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUWS81USLCNBRNQC3W9Y","name":"charlie"}} ::: program=null ::: clientIP=77.109.152.118 ::: userName=charlie ::: created_at=1661602229 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661602229 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1661602229",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "209.198.200.228",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS02",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=209.198.200.228 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"77.109.152.118\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"209.198.200.228\",\"location\":{\"city\":\"Peoscorptree Corners\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"678-768-5994\"},\"email\":\"charlie@oscorp.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-27T12:10:29.538097+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1661602229,\"txid\":\"70ae84fa-2277-4131-ae6f-ebabcfba7a7a\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUWS81USLCNBRNQC3W9Y\",\"name\":\"charlie\"}} ::: program=null ::: clientIP=77.109.152.118 ::: userName=charlie ::: created_at=1661602229 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661602229 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "77.109.152.118",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=209.198.200.228 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"77.109.152.118","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"209.198.200.228","location":{"city":"Peoscorptree Corners","country":"United States","state":"Georgia"},"name":"678-768-5994"},"email":"charlie@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-27T12:10:29.538097+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661602229,"txid":"70ae84fa-2277-4131-ae6f-ebabcfba7a7a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUWS81USLCNBRNQC3W9Y","name":"charlie"}} ::: program=null ::: clientIP=77.109.152.118 ::: userName=charlie ::: created_at=1661602229 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661602229 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=209.198.200.228 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"77.109.152.118","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"209.198.200.228","location":{"city":"Peoscorptree Corners","country":"United States","state":"Georgia"},"name":"678-768-5994"},"email":"charlie@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-27T12:10:29.538097+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1661602229,"txid":"70ae84fa-2277-4131-ae6f-ebabcfba7a7a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUWS81USLCNBRNQC3W9Y","name":"charlie"}} ::: program=null ::: clientIP=77.109.152.118 ::: userName=charlie ::: created_at=1661602229 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1661602229 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1661602229
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 209.198.200.228
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS02
streamName: DUO
clientIP: 77.109.152.118
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"46.97.31.73","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGACMECME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGACMECME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"46.97.31.73","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=46.97.31.73 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=Authenticate user with AD agent\",\"userDisplay=undefined | undefined\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u176suj2KgPRj9K697\",\"status\":\"ACTIVE\",\"created\":\"2022-05-27T15:49:21.000Z\",\"activated\":\"2022-05-27T15:49:22.000Z\",\"statusChanged\":\"2023-05-03T17:47:47.000Z\",\"lastLogin\":\"2023-05-18T17:12:00.000Z\",\"lastUpdated\":\"2023-05-18T23:25:08.000Z\",\"passwordChanged\":\"2023-05-03T17:47:47.000Z\",\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"IT\",\"lastName\":\"Support\",\"mobilePhone\":null,\"secondEmail\":\"\",\"login\":\"fish\",\"email\":\"fish\"},\"credentials\":{\"password\":{},\"provider\":{\"type\":\"OKTA\",\"name\":\"OKTA\"}},\"_links\":{\"suspend\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697\"},\"resetFactors\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u176suj2KgPRj9K697\",\"type\":\"User\",\"alternateId\":\"fish\",\"displayName\":\"IT Support\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)\",\"os\":\"Windows 8\",\"browser\":\"UNKNOWN\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":\"cappT0Hfy97F1BoO1UTR\",\"ipAddress\":\"46.97.31.73\",\"geographicalContext\":{\"city\":\"Santa Ana\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92704\",\"geolocation\":{\"lat\":33.7256,\"lon\":-117.9119}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":\"ACTIVE_DIRECTORY\",\"credentialProvider\":null,\"credentialType\":\"PASSWORD\",\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"trsq3WGy8SeSeaoSRiohJxtow\"},\"displayMessage\":\"Authenticate user with AD agent\",\"eventType\":\"user.authentication.auth_via_AD_agent\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"Login Failed\"},\"published\":\"2023-10-03T15:44:17.600Z\",\"securityContext\":{\"asNumber\":3561,\"asOrg\":\"san diego private bank\",\"isp\":\"centurylink communications llc\",\"domain\":\"merituspayment.com\",\"isProxy\":false},\"severity\":\"ERROR\",\"debugContext\":{\"debugData\":{\"requestId\":\"ZRw20WgxbdCcsPJ2V1qIGACMECME\",\"dtHash\":\"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f\",\"requestUri\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult\",\"url\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5\"}},\"legacyEventType\":\"app.ad.agent.user_auth.error\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZRw20WgxbdCcsPJ2V1qIGACMECME\",\"detail\":{\"requestApiTokenId\":\"00Tb3jwyxdZ9wzFyO696\"}},\"uuid\":\"b62eac19-6203-11ee-a5be-01e9b0dd7093\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"46.97.31.73\",\"geographicalContext\":{\"city\":\"Santa Ana\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92704\",\"geolocation\":{\"lat\":33.7256,\"lon\":-117.9119}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa16yxhp6iUzuI2b697\",\"type\":\"AppInstance\",\"alternateId\":\"SDPB.LOCAL\",\"displayName\":\"Active Directory\",\"detailEntry\":null}]}} ::: program=UNKNOWN ::: clientIP=46.97.31.73 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "UNKNOWN",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"tags": [
"userDisplay=undefined | undefined",
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"description=Authenticate user with AD agent",
"auth_failure"
],
"vendorcode": "user.authentication.auth_via_AD_agent",
"streamName": "Okta",
"clientIP": "46.97.31.73",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"46.97.31.73","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGACMECME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGACMECME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"46.97.31.73","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=46.97.31.73 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"46.97.31.73","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGACMECME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGACMECME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"46.97.31.73","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=46.97.31.73 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: UNKNOWN
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
tags: ['userDisplay=undefined | undefined', 'reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=Authenticate user with AD agent', 'auth_failure']
vendorcode: user.authentication.auth_via_AD_agent
streamName: Okta
clientIP: 46.97.31.73
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"32.158.25.206","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGOSCORPCME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGOSCORPCME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"32.158.25.206","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=32.158.25.206 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=Authenticate user with AD agent\",\"userDisplay=undefined | undefined\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u176suj2KgPRj9K697\",\"status\":\"ACTIVE\",\"created\":\"2022-05-27T15:49:21.000Z\",\"activated\":\"2022-05-27T15:49:22.000Z\",\"statusChanged\":\"2023-05-03T17:47:47.000Z\",\"lastLogin\":\"2023-05-18T17:12:00.000Z\",\"lastUpdated\":\"2023-05-18T23:25:08.000Z\",\"passwordChanged\":\"2023-05-03T17:47:47.000Z\",\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"IT\",\"lastName\":\"Support\",\"mobilePhone\":null,\"secondEmail\":\"\",\"login\":\"fish\",\"email\":\"fish\"},\"credentials\":{\"password\":{},\"provider\":{\"type\":\"OKTA\",\"name\":\"OKTA\"}},\"_links\":{\"suspend\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697\"},\"resetFactors\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u176suj2KgPRj9K697\",\"type\":\"User\",\"alternateId\":\"fish\",\"displayName\":\"IT Support\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)\",\"os\":\"Windows 8\",\"browser\":\"UNKNOWN\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":\"cappT0Hfy97F1BoO1UTR\",\"ipAddress\":\"32.158.25.206\",\"geographicalContext\":{\"city\":\"Santa Ana\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92704\",\"geolocation\":{\"lat\":33.7256,\"lon\":-117.9119}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":\"ACTIVE_DIRECTORY\",\"credentialProvider\":null,\"credentialType\":\"PASSWORD\",\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"trsq3WGy8SeSeaoSRiohJxtow\"},\"displayMessage\":\"Authenticate user with AD agent\",\"eventType\":\"user.authentication.auth_via_AD_agent\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"Login Failed\"},\"published\":\"2023-10-03T15:44:17.600Z\",\"securityContext\":{\"asNumber\":3561,\"asOrg\":\"san diego private bank\",\"isp\":\"centurylink communications llc\",\"domain\":\"merituspayment.com\",\"isProxy\":false},\"severity\":\"ERROR\",\"debugContext\":{\"debugData\":{\"requestId\":\"ZRw20WgxbdCcsPJ2V1qIGOSCORPCME\",\"dtHash\":\"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f\",\"requestUri\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult\",\"url\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5\"}},\"legacyEventType\":\"app.ad.agent.user_auth.error\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZRw20WgxbdCcsPJ2V1qIGOSCORPCME\",\"detail\":{\"requestApiTokenId\":\"00Tb3jwyxdZ9wzFyO696\"}},\"uuid\":\"b62eac19-6203-11ee-a5be-01e9b0dd7093\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"32.158.25.206\",\"geographicalContext\":{\"city\":\"Santa Ana\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92704\",\"geolocation\":{\"lat\":33.7256,\"lon\":-117.9119}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa16yxhp6iUzuI2b697\",\"type\":\"AppInstance\",\"alternateId\":\"SDPB.LOCAL\",\"displayName\":\"Active Directory\",\"detailEntry\":null}]}} ::: program=UNKNOWN ::: clientIP=32.158.25.206 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "UNKNOWN",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"tags": [
"userDisplay=undefined | undefined",
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"description=Authenticate user with AD agent",
"auth_failure"
],
"vendorcode": "user.authentication.auth_via_AD_agent",
"streamName": "Okta",
"clientIP": "32.158.25.206",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"32.158.25.206","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGOSCORPCME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGOSCORPCME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"32.158.25.206","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=32.158.25.206 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"32.158.25.206","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGOSCORPCME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGOSCORPCME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"32.158.25.206","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=32.158.25.206 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: UNKNOWN
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
tags: ['userDisplay=undefined | undefined', 'reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=Authenticate user with AD agent', 'auth_failure']
vendorcode: user.authentication.auth_via_AD_agent
streamName: Okta
clientIP: 32.158.25.206
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"47.237.191.34","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGUMBRELLACME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGUMBRELLACME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"47.237.191.34","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=47.237.191.34 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=Authenticate user with AD agent\",\"userDisplay=undefined | undefined\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u176suj2KgPRj9K697\",\"status\":\"ACTIVE\",\"created\":\"2022-05-27T15:49:21.000Z\",\"activated\":\"2022-05-27T15:49:22.000Z\",\"statusChanged\":\"2023-05-03T17:47:47.000Z\",\"lastLogin\":\"2023-05-18T17:12:00.000Z\",\"lastUpdated\":\"2023-05-18T23:25:08.000Z\",\"passwordChanged\":\"2023-05-03T17:47:47.000Z\",\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"IT\",\"lastName\":\"Support\",\"mobilePhone\":null,\"secondEmail\":\"\",\"login\":\"fish\",\"email\":\"fish\"},\"credentials\":{\"password\":{},\"provider\":{\"type\":\"OKTA\",\"name\":\"OKTA\"}},\"_links\":{\"suspend\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697\"},\"resetFactors\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u176suj2KgPRj9K697\",\"type\":\"User\",\"alternateId\":\"fish\",\"displayName\":\"IT Support\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)\",\"os\":\"Windows 8\",\"browser\":\"UNKNOWN\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":\"cappT0Hfy97F1BoO1UTR\",\"ipAddress\":\"47.237.191.34\",\"geographicalContext\":{\"city\":\"Santa Ana\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92704\",\"geolocation\":{\"lat\":33.7256,\"lon\":-117.9119}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":\"ACTIVE_DIRECTORY\",\"credentialProvider\":null,\"credentialType\":\"PASSWORD\",\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"trsq3WGy8SeSeaoSRiohJxtow\"},\"displayMessage\":\"Authenticate user with AD agent\",\"eventType\":\"user.authentication.auth_via_AD_agent\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"Login Failed\"},\"published\":\"2023-10-03T15:44:17.600Z\",\"securityContext\":{\"asNumber\":3561,\"asOrg\":\"san diego private bank\",\"isp\":\"centurylink communications llc\",\"domain\":\"merituspayment.com\",\"isProxy\":false},\"severity\":\"ERROR\",\"debugContext\":{\"debugData\":{\"requestId\":\"ZRw20WgxbdCcsPJ2V1qIGUMBRELLACME\",\"dtHash\":\"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f\",\"requestUri\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult\",\"url\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5\"}},\"legacyEventType\":\"app.ad.agent.user_auth.error\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZRw20WgxbdCcsPJ2V1qIGUMBRELLACME\",\"detail\":{\"requestApiTokenId\":\"00Tb3jwyxdZ9wzFyO696\"}},\"uuid\":\"b62eac19-6203-11ee-a5be-01e9b0dd7093\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"47.237.191.34\",\"geographicalContext\":{\"city\":\"Santa Ana\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92704\",\"geolocation\":{\"lat\":33.7256,\"lon\":-117.9119}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa16yxhp6iUzuI2b697\",\"type\":\"AppInstance\",\"alternateId\":\"SDPB.LOCAL\",\"displayName\":\"Active Directory\",\"detailEntry\":null}]}} ::: program=UNKNOWN ::: clientIP=47.237.191.34 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "UNKNOWN",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"tags": [
"userDisplay=undefined | undefined",
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"description=Authenticate user with AD agent",
"auth_failure"
],
"vendorcode": "user.authentication.auth_via_AD_agent",
"streamName": "Okta",
"clientIP": "47.237.191.34",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"47.237.191.34","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGUMBRELLACME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGUMBRELLACME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"47.237.191.34","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=47.237.191.34 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"47.237.191.34","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGUMBRELLACME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGUMBRELLACME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"47.237.191.34","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=47.237.191.34 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: UNKNOWN
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
tags: ['userDisplay=undefined | undefined', 'reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=Authenticate user with AD agent', 'auth_failure']
vendorcode: user.authentication.auth_via_AD_agent
streamName: Okta
clientIP: 47.237.191.34
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"nighthawk","email":"nighthawk"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"nighthawk","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"88.89.146.185","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGACMECME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGACMECME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"88.89.146.185","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=88.89.146.185 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=Authenticate user with AD agent\",\"userDisplay=undefined | undefined\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u176suj2KgPRj9K697\",\"status\":\"ACTIVE\",\"created\":\"2022-05-27T15:49:21.000Z\",\"activated\":\"2022-05-27T15:49:22.000Z\",\"statusChanged\":\"2023-05-03T17:47:47.000Z\",\"lastLogin\":\"2023-05-18T17:12:00.000Z\",\"lastUpdated\":\"2023-05-18T23:25:08.000Z\",\"passwordChanged\":\"2023-05-03T17:47:47.000Z\",\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"IT\",\"lastName\":\"Support\",\"mobilePhone\":null,\"secondEmail\":\"\",\"login\":\"nighthawk\",\"email\":\"nighthawk\"},\"credentials\":{\"password\":{},\"provider\":{\"type\":\"OKTA\",\"name\":\"OKTA\"}},\"_links\":{\"suspend\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697\"},\"resetFactors\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u176suj2KgPRj9K697\",\"type\":\"User\",\"alternateId\":\"nighthawk\",\"displayName\":\"IT Support\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)\",\"os\":\"Windows 8\",\"browser\":\"UNKNOWN\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":\"cappT0Hfy97F1BoO1UTR\",\"ipAddress\":\"88.89.146.185\",\"geographicalContext\":{\"city\":\"Santa Ana\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92704\",\"geolocation\":{\"lat\":33.7256,\"lon\":-117.9119}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":\"ACTIVE_DIRECTORY\",\"credentialProvider\":null,\"credentialType\":\"PASSWORD\",\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"trsq3WGy8SeSeaoSRiohJxtow\"},\"displayMessage\":\"Authenticate user with AD agent\",\"eventType\":\"user.authentication.auth_via_AD_agent\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"Login Failed\"},\"published\":\"2023-10-03T15:44:17.600Z\",\"securityContext\":{\"asNumber\":3561,\"asOrg\":\"san diego private bank\",\"isp\":\"centurylink communications llc\",\"domain\":\"merituspayment.com\",\"isProxy\":false},\"severity\":\"ERROR\",\"debugContext\":{\"debugData\":{\"requestId\":\"ZRw20WgxbdCcsPJ2V1qIGACMECME\",\"dtHash\":\"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f\",\"requestUri\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult\",\"url\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5\"}},\"legacyEventType\":\"app.ad.agent.user_auth.error\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZRw20WgxbdCcsPJ2V1qIGACMECME\",\"detail\":{\"requestApiTokenId\":\"00Tb3jwyxdZ9wzFyO696\"}},\"uuid\":\"b62eac19-6203-11ee-a5be-01e9b0dd7093\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"88.89.146.185\",\"geographicalContext\":{\"city\":\"Santa Ana\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92704\",\"geolocation\":{\"lat\":33.7256,\"lon\":-117.9119}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa16yxhp6iUzuI2b697\",\"type\":\"AppInstance\",\"alternateId\":\"SDPB.LOCAL\",\"displayName\":\"Active Directory\",\"detailEntry\":null}]}} ::: program=UNKNOWN ::: clientIP=88.89.146.185 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "UNKNOWN",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"tags": [
"userDisplay=undefined | undefined",
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"description=Authenticate user with AD agent",
"auth_failure"
],
"vendorcode": "user.authentication.auth_via_AD_agent",
"streamName": "Okta",
"clientIP": "88.89.146.185",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"nighthawk","email":"nighthawk"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"nighthawk","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"88.89.146.185","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGACMECME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGACMECME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"88.89.146.185","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=88.89.146.185 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"nighthawk","email":"nighthawk"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"nighthawk","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"88.89.146.185","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trsq3WGy8SeSeaoSRiohJxtow"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-10-03T15:44:17.600Z","securityContext":{"asNumber":3561,"asOrg":"san diego private bank","isp":"centurylink communications llc","domain":"merituspayment.com","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZRw20WgxbdCcsPJ2V1qIGACMECME","dtHash":"2b67c5b1387816afe388f836400e7ad438e048eaabca36b9ea1eceaa1f0f5f1f","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a532lo6a4sAZS1Lht697/actionResult?responseId=9c7cf28c-9ab3-4356-afa6-d32dfa2ddcf5"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZRw20WgxbdCcsPJ2V1qIGACMECME","detail":{"requestApiTokenId":"00Tb3jwyxdZ9wzFyO696"}},"uuid":"b62eac19-6203-11ee-a5be-01e9b0dd7093","version":"0","request":{"ipChain":[{"ip":"88.89.146.185","geographicalContext":{"city":"Santa Ana","state":"California","country":"United States","postalCode":"92704","geolocation":{"lat":33.7256,"lon":-117.9119}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=88.89.146.185 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-10-03T15:44:17.600Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: UNKNOWN
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
tags: ['userDisplay=undefined | undefined', 'reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=Authenticate user with AD agent', 'auth_failure']
vendorcode: user.authentication.auth_via_AD_agent
streamName: Okta
clientIP: 88.89.146.185
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t78.87.247.246\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"78.87.247.246","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53223,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-09T13:00:06.894Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-09T13:00:08.172Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tsdpb.local\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCMANAGEENGINE\\n\\tSource Network Address:\\t78.87.247.246\\n\\tSource Port:\\t\\t53223\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"78.87.247.246\",\"IpPort\":\"53223\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"sdpb.local\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCMANAGEENGINE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2180}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6638217117,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6638217117",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "78.87.247.246",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t78.87.247.246\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"78.87.247.246","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t78.87.247.246\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"78.87.247.246","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53223
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6638217117
streamName: microsoft-windows-security-auditing
clientIP: 78.87.247.246
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t71.216.237.251\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"71.216.237.251","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53223,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-09T13:00:06.894Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-09T13:00:08.172Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tsdpb.local\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCMANAGEENGINE\\n\\tSource Network Address:\\t71.216.237.251\\n\\tSource Port:\\t\\t53223\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"71.216.237.251\",\"IpPort\":\"53223\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"sdpb.local\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCMANAGEENGINE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2180}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6638217117,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6638217117",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "71.216.237.251",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t71.216.237.251\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"71.216.237.251","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t71.216.237.251\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"71.216.237.251","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53223
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6638217117
streamName: microsoft-windows-security-auditing
clientIP: 71.216.237.251
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t243.119.130.229\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"243.119.130.229","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53223,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-09T13:00:06.894Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-09T13:00:08.172Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tsdpb.local\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCMANAGEENGINE\\n\\tSource Network Address:\\t243.119.130.229\\n\\tSource Port:\\t\\t53223\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"243.119.130.229\",\"IpPort\":\"53223\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"sdpb.local\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCMANAGEENGINE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2180}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6638217117,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6638217117",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "243.119.130.229",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t243.119.130.229\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"243.119.130.229","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t243.119.130.229\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"243.119.130.229","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53223
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6638217117
streamName: microsoft-windows-security-auditing
clientIP: 243.119.130.229
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t123.208.161.74\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"123.208.161.74","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53223,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-09T13:00:06.894Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-09T13:00:08.172Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tsdpb.local\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCMANAGEENGINE\\n\\tSource Network Address:\\t123.208.161.74\\n\\tSource Port:\\t\\t53223\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"123.208.161.74\",\"IpPort\":\"53223\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"sdpb.local\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCMANAGEENGINE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2180}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6638217117,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6638217117",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "123.208.161.74",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t123.208.161.74\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"123.208.161.74","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-09T13:00:06.894Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-09T13:00:08.172Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t123.208.161.74\n\tSource Port:\t\t53223\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"123.208.161.74","IpPort":"53223","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2180}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6638217117,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53223
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6638217117
streamName: microsoft-windows-security-auditing
clientIP: 123.208.161.74
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"84.244.181.221","externalIp":"190.29.0.69","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=84.244.181.221 ::: serverIP=190.29.0.69 ::: userName=fish ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-31T21:31:53.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"84.244.181.221\",\"externalIp\":\"190.29.0.69\",\"categories\":[\"Malware\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"cab8fsphak15dd000010y57568uuxhcx6.oast.live\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-31T21:31:53.000Z\"} ::: clientIP=84.244.181.221 ::: serverIP=190.29.0.69 ::: userName=fish ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "cab8fsphak15dd000010y57568uuxhcx6.oast.live",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "cab8fsphak15dd000010y57568uuxhcx6.oast.live",
"vendorcode": "MalwareInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "84.244.181.221",
"serverIP": "190.29.0.69",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"84.244.181.221","externalIp":"190.29.0.69","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=84.244.181.221 ::: serverIP=190.29.0.69 ::: userName=fish ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"84.244.181.221","externalIp":"190.29.0.69","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=84.244.181.221 ::: serverIP=190.29.0.69 ::: userName=fish ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-31T21:31:53.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: cab8fsphak15dd000010y57568uuxhcx6.oast.live
messagetype: firewall_action
severitycode: 2
fqdn: cab8fsphak15dd000010y57568uuxhcx6.oast.live
vendorcode: MalwareInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 84.244.181.221
serverIP: 190.29.0.69
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"36.180.140.4","externalIp":"236.154.164.80","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=36.180.140.4 ::: serverIP=236.154.164.80 ::: userName=fish ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-31T21:31:53.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"36.180.140.4\",\"externalIp\":\"236.154.164.80\",\"categories\":[\"Malware\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"cab8fsphak15dd000010y57568uuxhcx6.oast.live\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-31T21:31:53.000Z\"} ::: clientIP=36.180.140.4 ::: serverIP=236.154.164.80 ::: userName=fish ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "cab8fsphak15dd000010y57568uuxhcx6.oast.live",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "cab8fsphak15dd000010y57568uuxhcx6.oast.live",
"vendorcode": "MalwareInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "36.180.140.4",
"serverIP": "236.154.164.80",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"36.180.140.4","externalIp":"236.154.164.80","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=36.180.140.4 ::: serverIP=236.154.164.80 ::: userName=fish ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"36.180.140.4","externalIp":"236.154.164.80","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=36.180.140.4 ::: serverIP=236.154.164.80 ::: userName=fish ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-31T21:31:53.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: cab8fsphak15dd000010y57568uuxhcx6.oast.live
messagetype: firewall_action
severitycode: 2
fqdn: cab8fsphak15dd000010y57568uuxhcx6.oast.live
vendorcode: MalwareInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 36.180.140.4
serverIP: 236.154.164.80
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"61.107.8.127","externalIp":"132.36.219.16","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=61.107.8.127 ::: serverIP=132.36.219.16 ::: userName=nighthawk ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-31T21:31:53.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"61.107.8.127\",\"externalIp\":\"132.36.219.16\",\"categories\":[\"Malware\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"cab8fsphak15dd000010y57568uuxhcx6.oast.live\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-31T21:31:53.000Z\"} ::: clientIP=61.107.8.127 ::: serverIP=132.36.219.16 ::: userName=nighthawk ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "cab8fsphak15dd000010y57568uuxhcx6.oast.live",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "cab8fsphak15dd000010y57568uuxhcx6.oast.live",
"vendorcode": "MalwareInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "61.107.8.127",
"serverIP": "132.36.219.16",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"61.107.8.127","externalIp":"132.36.219.16","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=61.107.8.127 ::: serverIP=132.36.219.16 ::: userName=nighthawk ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"61.107.8.127","externalIp":"132.36.219.16","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=61.107.8.127 ::: serverIP=132.36.219.16 ::: userName=nighthawk ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-31T21:31:53.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: cab8fsphak15dd000010y57568uuxhcx6.oast.live
messagetype: firewall_action
severitycode: 2
fqdn: cab8fsphak15dd000010y57568uuxhcx6.oast.live
vendorcode: MalwareInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 61.107.8.127
serverIP: 132.36.219.16
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"206.251.79.138","externalIp":"248.218.66.201","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=206.251.79.138 ::: serverIP=248.218.66.201 ::: userName=janedoe ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-31T21:31:53.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"206.251.79.138\",\"externalIp\":\"248.218.66.201\",\"categories\":[\"Malware\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"cab8fsphak15dd000010y57568uuxhcx6.oast.live\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-31T21:31:53.000Z\"} ::: clientIP=206.251.79.138 ::: serverIP=248.218.66.201 ::: userName=janedoe ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "cab8fsphak15dd000010y57568uuxhcx6.oast.live",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "cab8fsphak15dd000010y57568uuxhcx6.oast.live",
"vendorcode": "MalwareInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "206.251.79.138",
"serverIP": "248.218.66.201",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"206.251.79.138","externalIp":"248.218.66.201","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=206.251.79.138 ::: serverIP=248.218.66.201 ::: userName=janedoe ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"206.251.79.138","externalIp":"248.218.66.201","categories":["Malware","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"cab8fsphak15dd000010y57568uuxhcx6.oast.live","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-31T21:31:53.000Z"} ::: clientIP=206.251.79.138 ::: serverIP=248.218.66.201 ::: userName=janedoe ::: created_at=2022-05-31T21:31:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-31T21:31:53.000Z ::: serverHostname=cab8fsphak15dd000010y57568uuxhcx6.oast.live ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-31T21:31:53.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: cab8fsphak15dd000010y57568uuxhcx6.oast.live
messagetype: firewall_action
severitycode: 2
fqdn: cab8fsphak15dd000010y57568uuxhcx6.oast.live
vendorcode: MalwareInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 206.251.79.138
serverIP: 248.218.66.201
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"57.187.178.255","externalIp":"106.245.39.28","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=57.187.178.255 ::: serverIP=106.245.39.28 ::: userName=nighthawk ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:53:35.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"57.187.178.255\",\"externalIp\":\"106.245.39.28\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:53:35.000Z\"} ::: clientIP=57.187.178.255 ::: serverIP=106.245.39.28 ::: userName=nighthawk ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "57.187.178.255",
"serverIP": "106.245.39.28",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"57.187.178.255","externalIp":"106.245.39.28","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=57.187.178.255 ::: serverIP=106.245.39.28 ::: userName=nighthawk ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"57.187.178.255","externalIp":"106.245.39.28","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=57.187.178.255 ::: serverIP=106.245.39.28 ::: userName=nighthawk ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:53:35.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 57.187.178.255
serverIP: 106.245.39.28
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"166.70.7.203","externalIp":"160.229.1.241","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=166.70.7.203 ::: serverIP=160.229.1.241 ::: userName=johndoe ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:53:35.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"166.70.7.203\",\"externalIp\":\"160.229.1.241\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:53:35.000Z\"} ::: clientIP=166.70.7.203 ::: serverIP=160.229.1.241 ::: userName=johndoe ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "166.70.7.203",
"serverIP": "160.229.1.241",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"166.70.7.203","externalIp":"160.229.1.241","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=166.70.7.203 ::: serverIP=160.229.1.241 ::: userName=johndoe ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"166.70.7.203","externalIp":"160.229.1.241","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=166.70.7.203 ::: serverIP=160.229.1.241 ::: userName=johndoe ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:53:35.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 166.70.7.203
serverIP: 160.229.1.241
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"52.55.245.166","externalIp":"34.170.220.207","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=52.55.245.166 ::: serverIP=34.170.220.207 ::: userName=bob ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:38:39.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"52.55.245.166\",\"externalIp\":\"34.170.220.207\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:38:39.000Z\"} ::: clientIP=52.55.245.166 ::: serverIP=34.170.220.207 ::: userName=bob ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "52.55.245.166",
"serverIP": "34.170.220.207",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"52.55.245.166","externalIp":"34.170.220.207","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=52.55.245.166 ::: serverIP=34.170.220.207 ::: userName=bob ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"52.55.245.166","externalIp":"34.170.220.207","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=52.55.245.166 ::: serverIP=34.170.220.207 ::: userName=bob ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:38:39.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 52.55.245.166
serverIP: 34.170.220.207
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"89.144.121.158","externalIp":"179.16.178.140","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=89.144.121.158 ::: serverIP=179.16.178.140 ::: userName=nighthawk ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:38:39.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"89.144.121.158\",\"externalIp\":\"179.16.178.140\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:38:39.000Z\"} ::: clientIP=89.144.121.158 ::: serverIP=179.16.178.140 ::: userName=nighthawk ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "89.144.121.158",
"serverIP": "179.16.178.140",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"89.144.121.158","externalIp":"179.16.178.140","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=89.144.121.158 ::: serverIP=179.16.178.140 ::: userName=nighthawk ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"89.144.121.158","externalIp":"179.16.178.140","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=89.144.121.158 ::: serverIP=179.16.178.140 ::: userName=nighthawk ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:38:39.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 89.144.121.158
serverIP: 179.16.178.140
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"20.165.148.81","externalIp":"169.11.32.196","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=20.165.148.81 ::: serverIP=169.11.32.196 ::: userName=bob ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:44:55.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"20.165.148.81\",\"externalIp\":\"169.11.32.196\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:44:55.000Z\"} ::: clientIP=20.165.148.81 ::: serverIP=169.11.32.196 ::: userName=bob ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "20.165.148.81",
"serverIP": "169.11.32.196",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"20.165.148.81","externalIp":"169.11.32.196","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=20.165.148.81 ::: serverIP=169.11.32.196 ::: userName=bob ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"20.165.148.81","externalIp":"169.11.32.196","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=20.165.148.81 ::: serverIP=169.11.32.196 ::: userName=bob ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:44:55.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 20.165.148.81
serverIP: 169.11.32.196
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"17.138.21.138","externalIp":"133.240.217.146","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=17.138.21.138 ::: serverIP=133.240.217.146 ::: userName=nighthawk ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:44:55.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"17.138.21.138\",\"externalIp\":\"133.240.217.146\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:44:55.000Z\"} ::: clientIP=17.138.21.138 ::: serverIP=133.240.217.146 ::: userName=nighthawk ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "17.138.21.138",
"serverIP": "133.240.217.146",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"17.138.21.138","externalIp":"133.240.217.146","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=17.138.21.138 ::: serverIP=133.240.217.146 ::: userName=nighthawk ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"17.138.21.138","externalIp":"133.240.217.146","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=17.138.21.138 ::: serverIP=133.240.217.146 ::: userName=nighthawk ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:44:55.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 17.138.21.138
serverIP: 133.240.217.146
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"110.23.138.90","externalIp":"139.163.79.60","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=110.23.138.90 ::: serverIP=139.163.79.60 ::: userName=janedoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-25T09:24:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"110.23.138.90\",\"externalIp\":\"139.163.79.60\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-25T09:24:49.000Z\"} ::: clientIP=110.23.138.90 ::: serverIP=139.163.79.60 ::: userName=janedoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "110.23.138.90",
"serverIP": "139.163.79.60",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"110.23.138.90","externalIp":"139.163.79.60","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=110.23.138.90 ::: serverIP=139.163.79.60 ::: userName=janedoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"110.23.138.90","externalIp":"139.163.79.60","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=110.23.138.90 ::: serverIP=139.163.79.60 ::: userName=janedoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-25T09:24:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 110.23.138.90
serverIP: 139.163.79.60
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"94.237.251.140","externalIp":"136.112.178.183","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=94.237.251.140 ::: serverIP=136.112.178.183 ::: userName=janedoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-25T09:24:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"94.237.251.140\",\"externalIp\":\"136.112.178.183\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-25T09:24:49.000Z\"} ::: clientIP=94.237.251.140 ::: serverIP=136.112.178.183 ::: userName=janedoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "94.237.251.140",
"serverIP": "136.112.178.183",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"94.237.251.140","externalIp":"136.112.178.183","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=94.237.251.140 ::: serverIP=136.112.178.183 ::: userName=janedoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"94.237.251.140","externalIp":"136.112.178.183","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=94.237.251.140 ::: serverIP=136.112.178.183 ::: userName=janedoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-25T09:24:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 94.237.251.140
serverIP: 136.112.178.183
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"181.189.181.229","externalIp":"48.138.125.34","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=181.189.181.229 ::: serverIP=48.138.125.34 ::: userName=johndoe ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:53:35.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"181.189.181.229\",\"externalIp\":\"48.138.125.34\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:53:35.000Z\"} ::: clientIP=181.189.181.229 ::: serverIP=48.138.125.34 ::: userName=johndoe ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "181.189.181.229",
"serverIP": "48.138.125.34",
"userName": "johndoe"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.