input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"242.103.60.58","externalIp":"75.40.130.21","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=242.103.60.58 ::: serverIP=75.40.130.21 ::: userName=bob ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"242.103.60.58","externalIp":"75.40.130.21","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=242.103.60.58 ::: serverIP=75.40.130.21 ::: userName=bob ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-23T15:12:23.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: diromalxx.com
messagetype: firewall_action
severitycode: 2
fqdn: diromalxx.com
vendorcode: AdvertisementsMalwarePhishing
action: block
streamName: OpenDNS Detection
clientIP: 242.103.60.58
serverIP: 75.40.130.21
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-18T18:20:48.308Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-18T18:20:48.693Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t42.194.56.25\n\tSource Port:\t\t53318\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"42.194.56.25","IpPort":"53318","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":30712}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6684023266,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53318,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-18T18:20:48.308Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-18T18:20:48.693Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t42.194.56.25\\n\\tSource Port:\\t\\t53318\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"42.194.56.25\",\"IpPort\":\"53318\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":30712}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6684023266,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6684023266",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "42.194.56.25",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-18T18:20:48.308Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-18T18:20:48.693Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t42.194.56.25\n\tSource Port:\t\t53318\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"42.194.56.25","IpPort":"53318","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":30712}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6684023266,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-18T18:20:48.308Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-18T18:20:48.693Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t42.194.56.25\n\tSource Port:\t\t53318\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"42.194.56.25","IpPort":"53318","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":30712}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6684023266,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53318
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6684023266
streamName: microsoft-windows-security-auditing
clientIP: 42.194.56.25
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-18T18:20:48.308Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-18T18:20:48.693Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t11.119.213.154\n\tSource Port:\t\t53318\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.119.213.154","IpPort":"53318","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":30712}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6684023266,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53318,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-18T18:20:48.308Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-18T18:20:48.693Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t11.119.213.154\\n\\tSource Port:\\t\\t53318\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"11.119.213.154\",\"IpPort\":\"53318\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":30712}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6684023266,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6684023266",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "11.119.213.154",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-18T18:20:48.308Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-18T18:20:48.693Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t11.119.213.154\n\tSource Port:\t\t53318\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.119.213.154","IpPort":"53318","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":30712}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6684023266,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-18T18:20:48.308Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-18T18:20:48.693Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t11.119.213.154\n\tSource Port:\t\t53318\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.119.213.154","IpPort":"53318","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":30712}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6684023266,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53318
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6684023266
streamName: microsoft-windows-security-auditing
clientIP: 11.119.213.154
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-18T18:20:48.308Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-18T18:20:48.693Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t150.181.33.227\n\tSource Port:\t\t53318\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"150.181.33.227","IpPort":"53318","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":30712}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6684023266,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53318,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-18T18:20:48.308Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-18T18:20:48.693Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t150.181.33.227\\n\\tSource Port:\\t\\t53318\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"150.181.33.227\",\"IpPort\":\"53318\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":30712}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6684023266,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6684023266",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "150.181.33.227",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-18T18:20:48.308Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-18T18:20:48.693Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t150.181.33.227\n\tSource Port:\t\t53318\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"150.181.33.227","IpPort":"53318","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":30712}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6684023266,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-18T18:20:48.308Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-18T18:20:48.693Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t150.181.33.227\n\tSource Port:\t\t53318\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"150.181.33.227","IpPort":"53318","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":30712}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6684023266,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53318
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6684023266
streamName: microsoft-windows-security-auditing
clientIP: 150.181.33.227
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-18T18:20:48.308Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-18T18:20:48.693Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t239.11.47.211\n\tSource Port:\t\t53318\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"239.11.47.211","IpPort":"53318","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":30712}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6684023266,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53318,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-18T18:20:48.308Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-18T18:20:48.693Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t239.11.47.211\\n\\tSource Port:\\t\\t53318\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"239.11.47.211\",\"IpPort\":\"53318\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":30712}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6684023266,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6684023266",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "239.11.47.211",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-18T18:20:48.308Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-18T18:20:48.693Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t239.11.47.211\n\tSource Port:\t\t53318\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"239.11.47.211","IpPort":"53318","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":30712}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6684023266,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-18T18:20:48.308Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-18T18:20:48.693Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t239.11.47.211\n\tSource Port:\t\t53318\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"239.11.47.211","IpPort":"53318","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":30712}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6684023266,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53318
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6684023266
streamName: microsoft-windows-security-auditing
clientIP: 239.11.47.211
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-08T22:16:13.412Z","agent":{"ephemeral_id":"ad7cf8e7-c5d8-455d-9bf4-c547b506fffd","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-08T22:16:14.748Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t29.111.149.225\n\tSource Port:\t\t50412\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"29.111.149.225","IpPort":"50412","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2428}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6943816251,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50412,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-08T22:16:13.412Z\",\"agent\":{\"ephemeral_id\":\"ad7cf8e7-c5d8-455d-9bf4-c547b506fffd\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-08T22:16:14.748Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSOLARWINDSSQ\\n\\tSource Network Address:\\t29.111.149.225\\n\\tSource Port:\\t\\t50412\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"29.111.149.225\",\"IpPort\":\"50412\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSOLARWINDSSQ\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":2428}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6943816251,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6943816251",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "29.111.149.225",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-08T22:16:13.412Z","agent":{"ephemeral_id":"ad7cf8e7-c5d8-455d-9bf4-c547b506fffd","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-08T22:16:14.748Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t29.111.149.225\n\tSource Port:\t\t50412\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"29.111.149.225","IpPort":"50412","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2428}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6943816251,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-08T22:16:13.412Z","agent":{"ephemeral_id":"ad7cf8e7-c5d8-455d-9bf4-c547b506fffd","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-08T22:16:14.748Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t29.111.149.225\n\tSource Port:\t\t50412\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"29.111.149.225","IpPort":"50412","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2428}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6943816251,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50412
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6943816251
streamName: microsoft-windows-security-auditing
clientIP: 29.111.149.225
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-08T22:16:13.412Z","agent":{"ephemeral_id":"ad7cf8e7-c5d8-455d-9bf4-c547b506fffd","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-08T22:16:14.748Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t105.249.48.174\n\tSource Port:\t\t50412\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"105.249.48.174","IpPort":"50412","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2428}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6943816251,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50412,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-08T22:16:13.412Z\",\"agent\":{\"ephemeral_id\":\"ad7cf8e7-c5d8-455d-9bf4-c547b506fffd\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-08T22:16:14.748Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSOLARWINDSSQ\\n\\tSource Network Address:\\t105.249.48.174\\n\\tSource Port:\\t\\t50412\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"105.249.48.174\",\"IpPort\":\"50412\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSOLARWINDSSQ\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":2428}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6943816251,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6943816251",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "105.249.48.174",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-08T22:16:13.412Z","agent":{"ephemeral_id":"ad7cf8e7-c5d8-455d-9bf4-c547b506fffd","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-08T22:16:14.748Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t105.249.48.174\n\tSource Port:\t\t50412\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"105.249.48.174","IpPort":"50412","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2428}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6943816251,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-08T22:16:13.412Z","agent":{"ephemeral_id":"ad7cf8e7-c5d8-455d-9bf4-c547b506fffd","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-08T22:16:14.748Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t105.249.48.174\n\tSource Port:\t\t50412\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"105.249.48.174","IpPort":"50412","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2428}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6943816251,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50412
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6943816251
streamName: microsoft-windows-security-auditing
clientIP: 105.249.48.174
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-08T22:16:13.412Z","agent":{"ephemeral_id":"ad7cf8e7-c5d8-455d-9bf4-c547b506fffd","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-08T22:16:14.748Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t227.102.33.142\n\tSource Port:\t\t50412\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"227.102.33.142","IpPort":"50412","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2428}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6943816251,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50412,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-08T22:16:13.412Z\",\"agent\":{\"ephemeral_id\":\"ad7cf8e7-c5d8-455d-9bf4-c547b506fffd\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-08T22:16:14.748Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSOLARWINDSSQ\\n\\tSource Network Address:\\t227.102.33.142\\n\\tSource Port:\\t\\t50412\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"227.102.33.142\",\"IpPort\":\"50412\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSOLARWINDSSQ\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":2428}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6943816251,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6943816251",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "227.102.33.142",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-08T22:16:13.412Z","agent":{"ephemeral_id":"ad7cf8e7-c5d8-455d-9bf4-c547b506fffd","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-08T22:16:14.748Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t227.102.33.142\n\tSource Port:\t\t50412\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"227.102.33.142","IpPort":"50412","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2428}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6943816251,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-08T22:16:13.412Z","agent":{"ephemeral_id":"ad7cf8e7-c5d8-455d-9bf4-c547b506fffd","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-08T22:16:14.748Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t227.102.33.142\n\tSource Port:\t\t50412\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"227.102.33.142","IpPort":"50412","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2428}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6943816251,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50412
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6943816251
streamName: microsoft-windows-security-auditing
clientIP: 227.102.33.142
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-08T22:16:13.412Z","agent":{"ephemeral_id":"ad7cf8e7-c5d8-455d-9bf4-c547b506fffd","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-08T22:16:14.748Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t213.221.161.39\n\tSource Port:\t\t50412\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"213.221.161.39","IpPort":"50412","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2428}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6943816251,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50412,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-08T22:16:13.412Z\",\"agent\":{\"ephemeral_id\":\"ad7cf8e7-c5d8-455d-9bf4-c547b506fffd\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-08T22:16:14.748Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSOLARWINDSSQ\\n\\tSource Network Address:\\t213.221.161.39\\n\\tSource Port:\\t\\t50412\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"213.221.161.39\",\"IpPort\":\"50412\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSOLARWINDSSQ\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":2428}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6943816251,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6943816251",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "213.221.161.39",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-08T22:16:13.412Z","agent":{"ephemeral_id":"ad7cf8e7-c5d8-455d-9bf4-c547b506fffd","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-08T22:16:14.748Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t213.221.161.39\n\tSource Port:\t\t50412\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"213.221.161.39","IpPort":"50412","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2428}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6943816251,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-08T22:16:13.412Z","agent":{"ephemeral_id":"ad7cf8e7-c5d8-455d-9bf4-c547b506fffd","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-08T22:16:14.748Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSOLARWINDSSQ\n\tSource Network Address:\t213.221.161.39\n\tSource Port:\t\t50412\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"213.221.161.39","IpPort":"50412","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSOLARWINDSSQ"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2428}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6943816251,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50412
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6943816251
streamName: microsoft-windows-security-auditing
clientIP: 213.221.161.39
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":535282774,"originType":"Network Devices","internalIp":"129.166.21.119","externalIp":"215.190.99.175","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T15:56:36.000Z"} ::: clientIP=129.166.21.119 ::: serverIP=215.190.99.175 ::: userName=johndoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T15:56:36.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={\"originId\":535282774,\"originType\":\"Network Devices\",\"internalIp\":\"129.166.21.119\",\"externalIp\":\"215.190.99.175\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.amazon.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T15:56:36.000Z\"} ::: clientIP=129.166.21.119 ::: serverIP=215.190.99.175 ::: userName=johndoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.amazon.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.amazon.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "129.166.21.119",
"serverIP": "215.190.99.175",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":535282774,"originType":"Network Devices","internalIp":"129.166.21.119","externalIp":"215.190.99.175","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T15:56:36.000Z"} ::: clientIP=129.166.21.119 ::: serverIP=215.190.99.175 ::: userName=johndoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":535282774,"originType":"Network Devices","internalIp":"129.166.21.119","externalIp":"215.190.99.175","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T15:56:36.000Z"} ::: clientIP=129.166.21.119 ::: serverIP=215.190.99.175 ::: userName=johndoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T15:56:36.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.amazon.com
messagetype: firewall_action
severitycode: 2
fqdn: www.amazon.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 129.166.21.119
serverIP: 215.190.99.175
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":535282774,"originType":"Network Devices","internalIp":"242.84.50.68","externalIp":"37.18.177.146","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T15:56:36.000Z"} ::: clientIP=242.84.50.68 ::: serverIP=37.18.177.146 ::: userName=janedoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T15:56:36.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={\"originId\":535282774,\"originType\":\"Network Devices\",\"internalIp\":\"242.84.50.68\",\"externalIp\":\"37.18.177.146\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.amazon.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T15:56:36.000Z\"} ::: clientIP=242.84.50.68 ::: serverIP=37.18.177.146 ::: userName=janedoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.amazon.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.amazon.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "242.84.50.68",
"serverIP": "37.18.177.146",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":535282774,"originType":"Network Devices","internalIp":"242.84.50.68","externalIp":"37.18.177.146","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T15:56:36.000Z"} ::: clientIP=242.84.50.68 ::: serverIP=37.18.177.146 ::: userName=janedoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":535282774,"originType":"Network Devices","internalIp":"242.84.50.68","externalIp":"37.18.177.146","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T15:56:36.000Z"} ::: clientIP=242.84.50.68 ::: serverIP=37.18.177.146 ::: userName=janedoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T15:56:36.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.amazon.com
messagetype: firewall_action
severitycode: 2
fqdn: www.amazon.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 242.84.50.68
serverIP: 37.18.177.146
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":535282774,"originType":"Network Devices","internalIp":"97.23.98.144","externalIp":"111.231.151.217","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T15:56:36.000Z"} ::: clientIP=97.23.98.144 ::: serverIP=111.231.151.217 ::: userName=janedoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T15:56:36.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={\"originId\":535282774,\"originType\":\"Network Devices\",\"internalIp\":\"97.23.98.144\",\"externalIp\":\"111.231.151.217\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.amazon.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T15:56:36.000Z\"} ::: clientIP=97.23.98.144 ::: serverIP=111.231.151.217 ::: userName=janedoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.amazon.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.amazon.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "97.23.98.144",
"serverIP": "111.231.151.217",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":535282774,"originType":"Network Devices","internalIp":"97.23.98.144","externalIp":"111.231.151.217","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T15:56:36.000Z"} ::: clientIP=97.23.98.144 ::: serverIP=111.231.151.217 ::: userName=janedoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":535282774,"originType":"Network Devices","internalIp":"97.23.98.144","externalIp":"111.231.151.217","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T15:56:36.000Z"} ::: clientIP=97.23.98.144 ::: serverIP=111.231.151.217 ::: userName=janedoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T15:56:36.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.amazon.com
messagetype: firewall_action
severitycode: 2
fqdn: www.amazon.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 97.23.98.144
serverIP: 111.231.151.217
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":535282774,"originType":"Network Devices","internalIp":"233.175.247.181","externalIp":"255.198.215.20","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T15:56:36.000Z"} ::: clientIP=233.175.247.181 ::: serverIP=255.198.215.20 ::: userName=charlie ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T15:56:36.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={\"originId\":535282774,\"originType\":\"Network Devices\",\"internalIp\":\"233.175.247.181\",\"externalIp\":\"255.198.215.20\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.amazon.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T15:56:36.000Z\"} ::: clientIP=233.175.247.181 ::: serverIP=255.198.215.20 ::: userName=charlie ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.amazon.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.amazon.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "233.175.247.181",
"serverIP": "255.198.215.20",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":535282774,"originType":"Network Devices","internalIp":"233.175.247.181","externalIp":"255.198.215.20","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T15:56:36.000Z"} ::: clientIP=233.175.247.181 ::: serverIP=255.198.215.20 ::: userName=charlie ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":535282774,"originType":"Network Devices","internalIp":"233.175.247.181","externalIp":"255.198.215.20","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T15:56:36.000Z"} ::: clientIP=233.175.247.181 ::: serverIP=255.198.215.20 ::: userName=charlie ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T15:56:36.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.amazon.com
messagetype: firewall_action
severitycode: 2
fqdn: www.amazon.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 233.175.247.181
serverIP: 255.198.215.20
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"111.157.120.121","externalIp":"198.105.115.27","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T16:02:29.000Z"} ::: clientIP=111.157.120.121 ::: serverIP=198.105.115.27 ::: userName=bob ::: created_at=2023-03-24T16:02:29.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:02:29.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T16:02:29.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"111.157.120.121\",\"externalIp\":\"198.105.115.27\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.amazon.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T16:02:29.000Z\"} ::: clientIP=111.157.120.121 ::: serverIP=198.105.115.27 ::: userName=bob ::: created_at=2023-03-24T16:02:29.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:02:29.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.amazon.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.amazon.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "111.157.120.121",
"serverIP": "198.105.115.27",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"111.157.120.121","externalIp":"198.105.115.27","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T16:02:29.000Z"} ::: clientIP=111.157.120.121 ::: serverIP=198.105.115.27 ::: userName=bob ::: created_at=2023-03-24T16:02:29.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:02:29.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"111.157.120.121","externalIp":"198.105.115.27","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T16:02:29.000Z"} ::: clientIP=111.157.120.121 ::: serverIP=198.105.115.27 ::: userName=bob ::: created_at=2023-03-24T16:02:29.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:02:29.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T16:02:29.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.amazon.com
messagetype: firewall_action
severitycode: 2
fqdn: www.amazon.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 111.157.120.121
serverIP: 198.105.115.27
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"206.120.138.69","externalIp":"20.115.236.5","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-24T16:02:29.000Z"} ::: clientIP=206.120.138.69 ::: serverIP=20.115.236.5 ::: userName=fish ::: created_at=2023-03-24T16:02:29.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:02:29.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T16:02:29.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"206.120.138.69\",\"externalIp\":\"20.115.236.5\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.amazon.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T16:02:29.000Z\"} ::: clientIP=206.120.138.69 ::: serverIP=20.115.236.5 ::: userName=fish ::: created_at=2023-03-24T16:02:29.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:02:29.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.amazon.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.amazon.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "206.120.138.69",
"serverIP": "20.115.236.5",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"206.120.138.69","externalIp":"20.115.236.5","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-24T16:02:29.000Z"} ::: clientIP=206.120.138.69 ::: serverIP=20.115.236.5 ::: userName=fish ::: created_at=2023-03-24T16:02:29.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:02:29.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"206.120.138.69","externalIp":"20.115.236.5","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-24T16:02:29.000Z"} ::: clientIP=206.120.138.69 ::: serverIP=20.115.236.5 ::: userName=fish ::: created_at=2023-03-24T16:02:29.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:02:29.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T16:02:29.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.amazon.com
messagetype: firewall_action
severitycode: 2
fqdn: www.amazon.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 206.120.138.69
serverIP: 20.115.236.5
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"70.29.48.121","externalIp":"1.177.62.233","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T11:39:04.000Z"} ::: clientIP=70.29.48.121 ::: serverIP=1.177.62.233 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T11:39:04.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"70.29.48.121\",\"externalIp\":\"1.177.62.233\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T11:39:04.000Z\"} ::: clientIP=70.29.48.121 ::: serverIP=1.177.62.233 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.bookdepository.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.bookdepository.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "70.29.48.121",
"serverIP": "1.177.62.233",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"70.29.48.121","externalIp":"1.177.62.233","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T11:39:04.000Z"} ::: clientIP=70.29.48.121 ::: serverIP=1.177.62.233 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"70.29.48.121","externalIp":"1.177.62.233","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T11:39:04.000Z"} ::: clientIP=70.29.48.121 ::: serverIP=1.177.62.233 ::: userName=johndoe ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T11:39:04.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.bookdepository.com
messagetype: firewall_action
severitycode: 2
fqdn: www.bookdepository.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 70.29.48.121
serverIP: 1.177.62.233
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"106.115.115.132","externalIp":"21.41.192.90","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-24T11:39:04.000Z"} ::: clientIP=106.115.115.132 ::: serverIP=21.41.192.90 ::: userName=fish ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T11:39:04.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"106.115.115.132\",\"externalIp\":\"21.41.192.90\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.bookdepository.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T11:39:04.000Z\"} ::: clientIP=106.115.115.132 ::: serverIP=21.41.192.90 ::: userName=fish ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.bookdepository.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.bookdepository.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "106.115.115.132",
"serverIP": "21.41.192.90",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"106.115.115.132","externalIp":"21.41.192.90","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-24T11:39:04.000Z"} ::: clientIP=106.115.115.132 ::: serverIP=21.41.192.90 ::: userName=fish ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.bookdepository.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"106.115.115.132","externalIp":"21.41.192.90","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.bookdepository.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-24T11:39:04.000Z"} ::: clientIP=106.115.115.132 ::: serverIP=21.41.192.90 ::: userName=fish ::: created_at=2023-03-24T11:39:04.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T11:39:04.000Z ::: serverHostname=www.bookdepository.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T11:39:04.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.bookdepository.com
messagetype: firewall_action
severitycode: 2
fqdn: www.bookdepository.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 106.115.115.132
serverIP: 21.41.192.90
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":535282774,"originType":"Network Devices","internalIp":"30.135.140.106","externalIp":"51.46.255.120","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T15:56:36.000Z"} ::: clientIP=30.135.140.106 ::: serverIP=51.46.255.120 ::: userName=janedoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T15:56:36.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={\"originId\":535282774,\"originType\":\"Network Devices\",\"internalIp\":\"30.135.140.106\",\"externalIp\":\"51.46.255.120\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.amazon.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T15:56:36.000Z\"} ::: clientIP=30.135.140.106 ::: serverIP=51.46.255.120 ::: userName=janedoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.amazon.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.amazon.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "30.135.140.106",
"serverIP": "51.46.255.120",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":535282774,"originType":"Network Devices","internalIp":"30.135.140.106","externalIp":"51.46.255.120","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T15:56:36.000Z"} ::: clientIP=30.135.140.106 ::: serverIP=51.46.255.120 ::: userName=janedoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":535282774,"originType":"Network Devices","internalIp":"30.135.140.106","externalIp":"51.46.255.120","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T15:56:36.000Z"} ::: clientIP=30.135.140.106 ::: serverIP=51.46.255.120 ::: userName=janedoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T15:56:36.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.amazon.com
messagetype: firewall_action
severitycode: 2
fqdn: www.amazon.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 30.135.140.106
serverIP: 51.46.255.120
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":535282774,"originType":"Network Devices","internalIp":"112.150.113.230","externalIp":"80.236.252.241","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T15:56:36.000Z"} ::: clientIP=112.150.113.230 ::: serverIP=80.236.252.241 ::: userName=johndoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-24T15:56:36.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={\"originId\":535282774,\"originType\":\"Network Devices\",\"internalIp\":\"112.150.113.230\",\"externalIp\":\"80.236.252.241\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"www.amazon.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T15:56:36.000Z\"} ::: clientIP=112.150.113.230 ::: serverIP=80.236.252.241 ::: userName=johndoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.amazon.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.amazon.com",
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "112.150.113.230",
"serverIP": "80.236.252.241",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":535282774,"originType":"Network Devices","internalIp":"112.150.113.230","externalIp":"80.236.252.241","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T15:56:36.000Z"} ::: clientIP=112.150.113.230 ::: serverIP=80.236.252.241 ::: userName=johndoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.amazon.com ::: action=BLOCKED ::: message={"originId":535282774,"originType":"Network Devices","internalIp":"112.150.113.230","externalIp":"80.236.252.241","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"www.amazon.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T15:56:36.000Z"} ::: clientIP=112.150.113.230 ::: serverIP=80.236.252.241 ::: userName=johndoe ::: created_at=2023-03-24T15:56:36.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T15:56:36.000Z ::: serverHostname=www.amazon.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-24T15:56:36.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.amazon.com
messagetype: firewall_action
severitycode: 2
fqdn: www.amazon.com
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
action: block
streamName: OpenDNS Detection
clientIP: 112.150.113.230
serverIP: 80.236.252.241
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"22.124.122.38","externalIp":"112.136.209.138","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=22.124.122.38 ::: serverIP=112.136.209.138 ::: userName=charlie ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-03T19:59:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"22.124.122.38\",\"externalIp\":\"112.136.209.138\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=22.124.122.38 ::: serverIP=112.136.209.138 ::: userName=charlie ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "22.124.122.38",
"serverIP": "112.136.209.138",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"22.124.122.38","externalIp":"112.136.209.138","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=22.124.122.38 ::: serverIP=112.136.209.138 ::: userName=charlie ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"22.124.122.38","externalIp":"112.136.209.138","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=22.124.122.38 ::: serverIP=112.136.209.138 ::: userName=charlie ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-03T19:59:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 22.124.122.38
serverIP: 112.136.209.138
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"149.158.33.211","externalIp":"102.226.163.240","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=149.158.33.211 ::: serverIP=102.226.163.240 ::: userName=janedoe ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-03T19:59:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"149.158.33.211\",\"externalIp\":\"102.226.163.240\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=149.158.33.211 ::: serverIP=102.226.163.240 ::: userName=janedoe ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "149.158.33.211",
"serverIP": "102.226.163.240",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"149.158.33.211","externalIp":"102.226.163.240","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=149.158.33.211 ::: serverIP=102.226.163.240 ::: userName=janedoe ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"149.158.33.211","externalIp":"102.226.163.240","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=149.158.33.211 ::: serverIP=102.226.163.240 ::: userName=janedoe ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-03T19:59:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 149.158.33.211
serverIP: 102.226.163.240
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"205.92.141.186","externalIp":"205.92.141.186","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=205.92.141.186 ::: serverIP=205.92.141.186 ::: userName=bob ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T18:04:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"205.92.141.186\",\"externalIp\":\"205.92.141.186\",\"categories\":[\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T18:04:37.000Z\"} ::: clientIP=205.92.141.186 ::: serverIP=205.92.141.186 ::: userName=bob ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "us-east.lazerpenguin.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "us-east.lazerpenguin.com",
"vendorcode": "MalwarePersonal VPNApplication",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "205.92.141.186",
"serverIP": "9.63.40.169",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"205.92.141.186","externalIp":"205.92.141.186","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=205.92.141.186 ::: serverIP=205.92.141.186 ::: userName=bob ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"205.92.141.186","externalIp":"205.92.141.186","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=205.92.141.186 ::: serverIP=205.92.141.186 ::: userName=bob ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T18:04:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: us-east.lazerpenguin.com
messagetype: firewall_action
severitycode: 2
fqdn: us-east.lazerpenguin.com
vendorcode: MalwarePersonal VPNApplication
action: block
streamName: OpenDNS Detection
clientIP: 205.92.141.186
serverIP: 9.63.40.169
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"241.16.215.167","externalIp":"241.16.215.167","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=241.16.215.167 ::: serverIP=241.16.215.167 ::: userName=janedoe ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T18:04:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"241.16.215.167\",\"externalIp\":\"241.16.215.167\",\"categories\":[\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T18:04:37.000Z\"} ::: clientIP=241.16.215.167 ::: serverIP=241.16.215.167 ::: userName=janedoe ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "us-east.lazerpenguin.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "us-east.lazerpenguin.com",
"vendorcode": "MalwarePersonal VPNApplication",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "241.16.215.167",
"serverIP": "137.247.48.23",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"241.16.215.167","externalIp":"241.16.215.167","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=241.16.215.167 ::: serverIP=241.16.215.167 ::: userName=janedoe ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"241.16.215.167","externalIp":"241.16.215.167","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=241.16.215.167 ::: serverIP=241.16.215.167 ::: userName=janedoe ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T18:04:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: us-east.lazerpenguin.com
messagetype: firewall_action
severitycode: 2
fqdn: us-east.lazerpenguin.com
vendorcode: MalwarePersonal VPNApplication
action: block
streamName: OpenDNS Detection
clientIP: 241.16.215.167
serverIP: 137.247.48.23
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"168.44.52.236","externalIp":"168.44.52.236","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=168.44.52.236 ::: serverIP=168.44.52.236 ::: userName=bob ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T18:04:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"168.44.52.236\",\"externalIp\":\"168.44.52.236\",\"categories\":[\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T18:04:37.000Z\"} ::: clientIP=168.44.52.236 ::: serverIP=168.44.52.236 ::: userName=bob ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "us-east.lazerpenguin.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "us-east.lazerpenguin.com",
"vendorcode": "MalwarePersonal VPNApplication",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "168.44.52.236",
"serverIP": "3.227.201.162",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"168.44.52.236","externalIp":"168.44.52.236","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=168.44.52.236 ::: serverIP=168.44.52.236 ::: userName=bob ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"168.44.52.236","externalIp":"168.44.52.236","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=168.44.52.236 ::: serverIP=168.44.52.236 ::: userName=bob ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T18:04:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: us-east.lazerpenguin.com
messagetype: firewall_action
severitycode: 2
fqdn: us-east.lazerpenguin.com
vendorcode: MalwarePersonal VPNApplication
action: block
streamName: OpenDNS Detection
clientIP: 168.44.52.236
serverIP: 3.227.201.162
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"40.124.225.150","externalIp":"40.124.225.150","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=40.124.225.150 ::: serverIP=40.124.225.150 ::: userName=bob ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T18:04:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"40.124.225.150\",\"externalIp\":\"40.124.225.150\",\"categories\":[\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T18:04:37.000Z\"} ::: clientIP=40.124.225.150 ::: serverIP=40.124.225.150 ::: userName=bob ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "us-east.lazerpenguin.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "us-east.lazerpenguin.com",
"vendorcode": "MalwarePersonal VPNApplication",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "40.124.225.150",
"serverIP": "105.1.229.193",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"40.124.225.150","externalIp":"40.124.225.150","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=40.124.225.150 ::: serverIP=40.124.225.150 ::: userName=bob ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"40.124.225.150","externalIp":"40.124.225.150","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=40.124.225.150 ::: serverIP=40.124.225.150 ::: userName=bob ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T18:04:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: us-east.lazerpenguin.com
messagetype: firewall_action
severitycode: 2
fqdn: us-east.lazerpenguin.com
vendorcode: MalwarePersonal VPNApplication
action: block
streamName: OpenDNS Detection
clientIP: 40.124.225.150
serverIP: 105.1.229.193
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"189.176.152.252","externalIp":"189.176.152.252","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=189.176.152.252 ::: serverIP=189.176.152.252 ::: userName=bob ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T18:04:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"189.176.152.252\",\"externalIp\":\"189.176.152.252\",\"categories\":[\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T18:04:37.000Z\"} ::: clientIP=189.176.152.252 ::: serverIP=189.176.152.252 ::: userName=bob ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "us-east.lazerpenguin.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "us-east.lazerpenguin.com",
"vendorcode": "MalwarePersonal VPNApplication",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "189.176.152.252",
"serverIP": "11.98.136.103",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"189.176.152.252","externalIp":"189.176.152.252","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=189.176.152.252 ::: serverIP=189.176.152.252 ::: userName=bob ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"189.176.152.252","externalIp":"189.176.152.252","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=189.176.152.252 ::: serverIP=189.176.152.252 ::: userName=bob ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T18:04:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: us-east.lazerpenguin.com
messagetype: firewall_action
severitycode: 2
fqdn: us-east.lazerpenguin.com
vendorcode: MalwarePersonal VPNApplication
action: block
streamName: OpenDNS Detection
clientIP: 189.176.152.252
serverIP: 11.98.136.103
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"251.97.216.160","externalIp":"251.97.216.160","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=251.97.216.160 ::: serverIP=251.97.216.160 ::: userName=charlie ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T18:04:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"251.97.216.160\",\"externalIp\":\"251.97.216.160\",\"categories\":[\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T18:04:37.000Z\"} ::: clientIP=251.97.216.160 ::: serverIP=251.97.216.160 ::: userName=charlie ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "us-east.lazerpenguin.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "us-east.lazerpenguin.com",
"vendorcode": "MalwarePersonal VPNApplication",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "251.97.216.160",
"serverIP": "19.181.10.134",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"251.97.216.160","externalIp":"251.97.216.160","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=251.97.216.160 ::: serverIP=251.97.216.160 ::: userName=charlie ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"251.97.216.160","externalIp":"251.97.216.160","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=251.97.216.160 ::: serverIP=251.97.216.160 ::: userName=charlie ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T18:04:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: us-east.lazerpenguin.com
messagetype: firewall_action
severitycode: 2
fqdn: us-east.lazerpenguin.com
vendorcode: MalwarePersonal VPNApplication
action: block
streamName: OpenDNS Detection
clientIP: 251.97.216.160
serverIP: 19.181.10.134
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"251.41.98.53","externalIp":"5.3.90.112","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=251.41.98.53 ::: serverIP=5.3.90.112 ::: userName=bob ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-03T14:44:16.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"251.41.98.53\",\"externalIp\":\"5.3.90.112\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"fbwallcheck.api-alliance.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-03T14:44:16.000Z\"} ::: clientIP=251.41.98.53 ::: serverIP=5.3.90.112 ::: userName=bob ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "fbwallcheck.api-alliance.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "fbwallcheck.api-alliance.com",
"vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "251.41.98.53",
"serverIP": "5.3.90.112",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"251.41.98.53","externalIp":"5.3.90.112","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=251.41.98.53 ::: serverIP=5.3.90.112 ::: userName=bob ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"251.41.98.53","externalIp":"5.3.90.112","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=251.41.98.53 ::: serverIP=5.3.90.112 ::: userName=bob ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-03T14:44:16.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: fbwallcheck.api-alliance.com
messagetype: firewall_action
severitycode: 2
fqdn: fbwallcheck.api-alliance.com
vendorcode: Business ServicesPotentially HarmfulBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 251.41.98.53
serverIP: 5.3.90.112
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"85.124.49.208","externalIp":"216.210.188.255","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=85.124.49.208 ::: serverIP=216.210.188.255 ::: userName=johndoe ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-03T14:44:16.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"85.124.49.208\",\"externalIp\":\"216.210.188.255\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"fbwallcheck.api-alliance.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-03T14:44:16.000Z\"} ::: clientIP=85.124.49.208 ::: serverIP=216.210.188.255 ::: userName=johndoe ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "fbwallcheck.api-alliance.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "fbwallcheck.api-alliance.com",
"vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "85.124.49.208",
"serverIP": "216.210.188.255",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"85.124.49.208","externalIp":"216.210.188.255","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=85.124.49.208 ::: serverIP=216.210.188.255 ::: userName=johndoe ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"85.124.49.208","externalIp":"216.210.188.255","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=85.124.49.208 ::: serverIP=216.210.188.255 ::: userName=johndoe ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-03T14:44:16.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: fbwallcheck.api-alliance.com
messagetype: firewall_action
severitycode: 2
fqdn: fbwallcheck.api-alliance.com
vendorcode: Business ServicesPotentially HarmfulBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 85.124.49.208
serverIP: 216.210.188.255
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"57.20.185.127","externalIp":"142.105.163.98","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=57.20.185.127 ::: serverIP=142.105.163.98 ::: userName=charlie ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-03T14:44:16.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"57.20.185.127\",\"externalIp\":\"142.105.163.98\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"gwallcheck.api-alliance.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-03T14:44:16.000Z\"} ::: clientIP=57.20.185.127 ::: serverIP=142.105.163.98 ::: userName=charlie ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "gwallcheck.api-alliance.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "gwallcheck.api-alliance.com",
"vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "57.20.185.127",
"serverIP": "142.105.163.98",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"57.20.185.127","externalIp":"142.105.163.98","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=57.20.185.127 ::: serverIP=142.105.163.98 ::: userName=charlie ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"57.20.185.127","externalIp":"142.105.163.98","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=57.20.185.127 ::: serverIP=142.105.163.98 ::: userName=charlie ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-03T14:44:16.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: gwallcheck.api-alliance.com
messagetype: firewall_action
severitycode: 2
fqdn: gwallcheck.api-alliance.com
vendorcode: Business ServicesPotentially HarmfulBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 57.20.185.127
serverIP: 142.105.163.98
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"28.211.75.155","externalIp":"173.201.134.32","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=28.211.75.155 ::: serverIP=173.201.134.32 ::: userName=fish ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-03T14:44:16.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"28.211.75.155\",\"externalIp\":\"173.201.134.32\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"gwallcheck.api-alliance.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-03T14:44:16.000Z\"} ::: clientIP=28.211.75.155 ::: serverIP=173.201.134.32 ::: userName=fish ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "gwallcheck.api-alliance.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "gwallcheck.api-alliance.com",
"vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "28.211.75.155",
"serverIP": "173.201.134.32",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"28.211.75.155","externalIp":"173.201.134.32","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=28.211.75.155 ::: serverIP=173.201.134.32 ::: userName=fish ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"28.211.75.155","externalIp":"173.201.134.32","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=28.211.75.155 ::: serverIP=173.201.134.32 ::: userName=fish ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-03T14:44:16.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: gwallcheck.api-alliance.com
messagetype: firewall_action
severitycode: 2
fqdn: gwallcheck.api-alliance.com
vendorcode: Business ServicesPotentially HarmfulBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 28.211.75.155
serverIP: 173.201.134.32
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"207.159.24.169","externalIp":"207.182.99.201","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=207.159.24.169 ::: serverIP=207.182.99.201 ::: userName=johndoe ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-03T14:44:16.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"207.159.24.169\",\"externalIp\":\"207.182.99.201\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"fbwallcheck.api-alliance.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-03T14:44:16.000Z\"} ::: clientIP=207.159.24.169 ::: serverIP=207.182.99.201 ::: userName=johndoe ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "fbwallcheck.api-alliance.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "fbwallcheck.api-alliance.com",
"vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "207.159.24.169",
"serverIP": "207.182.99.201",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"207.159.24.169","externalIp":"207.182.99.201","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=207.159.24.169 ::: serverIP=207.182.99.201 ::: userName=johndoe ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"207.159.24.169","externalIp":"207.182.99.201","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=207.159.24.169 ::: serverIP=207.182.99.201 ::: userName=johndoe ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-03T14:44:16.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: fbwallcheck.api-alliance.com
messagetype: firewall_action
severitycode: 2
fqdn: fbwallcheck.api-alliance.com
vendorcode: Business ServicesPotentially HarmfulBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 207.159.24.169
serverIP: 207.182.99.201
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"134.6.201.251","externalIp":"71.225.121.110","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=134.6.201.251 ::: serverIP=71.225.121.110 ::: userName=alice ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-03T14:44:16.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"134.6.201.251\",\"externalIp\":\"71.225.121.110\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"fbwallcheck.api-alliance.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-03T14:44:16.000Z\"} ::: clientIP=134.6.201.251 ::: serverIP=71.225.121.110 ::: userName=alice ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "fbwallcheck.api-alliance.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "fbwallcheck.api-alliance.com",
"vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "134.6.201.251",
"serverIP": "71.225.121.110",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"134.6.201.251","externalIp":"71.225.121.110","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=134.6.201.251 ::: serverIP=71.225.121.110 ::: userName=alice ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"134.6.201.251","externalIp":"71.225.121.110","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=134.6.201.251 ::: serverIP=71.225.121.110 ::: userName=alice ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-03T14:44:16.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: fbwallcheck.api-alliance.com
messagetype: firewall_action
severitycode: 2
fqdn: fbwallcheck.api-alliance.com
vendorcode: Business ServicesPotentially HarmfulBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 134.6.201.251
serverIP: 71.225.121.110
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"62.176.66.234","externalIp":"31.223.139.229","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=62.176.66.234 ::: serverIP=31.223.139.229 ::: userName=alice ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-03T14:44:16.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"62.176.66.234\",\"externalIp\":\"31.223.139.229\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"gwallcheck.api-alliance.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-03T14:44:16.000Z\"} ::: clientIP=62.176.66.234 ::: serverIP=31.223.139.229 ::: userName=alice ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "gwallcheck.api-alliance.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "gwallcheck.api-alliance.com",
"vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "62.176.66.234",
"serverIP": "31.223.139.229",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"62.176.66.234","externalIp":"31.223.139.229","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=62.176.66.234 ::: serverIP=31.223.139.229 ::: userName=alice ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.