input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={"originId":410613112,"originType":"AD Users","internalIp":"174.16.175.132","externalIp":"174.16.175.132","categories":["Malware"],"tags":[],"destination":"meghannleisha.ru","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-23T01:13:13.000Z"} ::: clientIP=174.16.175.132 ::: serverIP=174.16.175.132 ::: userName=fish ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-23T01:13:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={\"originId\":410613112,\"originType\":\"AD Users\",\"internalIp\":\"174.16.175.132\",\"externalIp\":\"174.16.175.132\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"meghannleisha.ru\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-23T01:13:13.000Z\"} ::: clientIP=174.16.175.132 ::: serverIP=174.16.175.132 ::: userName=fish ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "meghannleisha.ru",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "meghannleisha.ru",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "174.16.175.132",
"serverIP": "8.61.236.38",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={"originId":410613112,"originType":"AD Users","internalIp":"174.16.175.132","externalIp":"174.16.175.132","categories":["Malware"],"tags":[],"destination":"meghannleisha.ru","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-23T01:13:13.000Z"} ::: clientIP=174.16.175.132 ::: serverIP=174.16.175.132 ::: userName=fish ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={"originId":410613112,"originType":"AD Users","internalIp":"174.16.175.132","externalIp":"174.16.175.132","categories":["Malware"],"tags":[],"destination":"meghannleisha.ru","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-23T01:13:13.000Z"} ::: clientIP=174.16.175.132 ::: serverIP=174.16.175.132 ::: userName=fish ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-23T01:13:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: meghannleisha.ru
messagetype: firewall_action
severitycode: 2
fqdn: meghannleisha.ru
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 174.16.175.132
serverIP: 8.61.236.38
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={"originId":410613112,"originType":"AD Users","internalIp":"249.175.18.183","externalIp":"249.175.18.183","categories":["Malware"],"tags":[],"destination":"meghannleisha.ru","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-23T01:13:13.000Z"} ::: clientIP=249.175.18.183 ::: serverIP=249.175.18.183 ::: userName=janedoe ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-23T01:13:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={\"originId\":410613112,\"originType\":\"AD Users\",\"internalIp\":\"249.175.18.183\",\"externalIp\":\"249.175.18.183\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"meghannleisha.ru\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-23T01:13:13.000Z\"} ::: clientIP=249.175.18.183 ::: serverIP=249.175.18.183 ::: userName=janedoe ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "meghannleisha.ru",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "meghannleisha.ru",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "249.175.18.183",
"serverIP": "181.162.237.224",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={"originId":410613112,"originType":"AD Users","internalIp":"249.175.18.183","externalIp":"249.175.18.183","categories":["Malware"],"tags":[],"destination":"meghannleisha.ru","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-23T01:13:13.000Z"} ::: clientIP=249.175.18.183 ::: serverIP=249.175.18.183 ::: userName=janedoe ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={"originId":410613112,"originType":"AD Users","internalIp":"249.175.18.183","externalIp":"249.175.18.183","categories":["Malware"],"tags":[],"destination":"meghannleisha.ru","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-23T01:13:13.000Z"} ::: clientIP=249.175.18.183 ::: serverIP=249.175.18.183 ::: userName=janedoe ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-23T01:13:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: meghannleisha.ru
messagetype: firewall_action
severitycode: 2
fqdn: meghannleisha.ru
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 249.175.18.183
serverIP: 181.162.237.224
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={"originId":410613112,"originType":"AD Users","internalIp":"90.104.22.43","externalIp":"90.104.22.43","categories":["Malware"],"tags":[],"destination":"meghannleisha.ru","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-23T01:13:13.000Z"} ::: clientIP=90.104.22.43 ::: serverIP=90.104.22.43 ::: userName=janedoe ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-23T01:13:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={\"originId\":410613112,\"originType\":\"AD Users\",\"internalIp\":\"90.104.22.43\",\"externalIp\":\"90.104.22.43\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"meghannleisha.ru\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-23T01:13:13.000Z\"} ::: clientIP=90.104.22.43 ::: serverIP=90.104.22.43 ::: userName=janedoe ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "meghannleisha.ru",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "meghannleisha.ru",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "90.104.22.43",
"serverIP": "41.151.36.101",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={"originId":410613112,"originType":"AD Users","internalIp":"90.104.22.43","externalIp":"90.104.22.43","categories":["Malware"],"tags":[],"destination":"meghannleisha.ru","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-23T01:13:13.000Z"} ::: clientIP=90.104.22.43 ::: serverIP=90.104.22.43 ::: userName=janedoe ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={"originId":410613112,"originType":"AD Users","internalIp":"90.104.22.43","externalIp":"90.104.22.43","categories":["Malware"],"tags":[],"destination":"meghannleisha.ru","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-23T01:13:13.000Z"} ::: clientIP=90.104.22.43 ::: serverIP=90.104.22.43 ::: userName=janedoe ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-23T01:13:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: meghannleisha.ru
messagetype: firewall_action
severitycode: 2
fqdn: meghannleisha.ru
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 90.104.22.43
serverIP: 41.151.36.101
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={"originId":410613112,"originType":"AD Users","internalIp":"158.64.235.90","externalIp":"158.64.235.90","categories":["Malware"],"tags":[],"destination":"meghannleisha.ru","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-23T01:13:13.000Z"} ::: clientIP=158.64.235.90 ::: serverIP=158.64.235.90 ::: userName=nighthawk ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-23T01:13:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={\"originId\":410613112,\"originType\":\"AD Users\",\"internalIp\":\"158.64.235.90\",\"externalIp\":\"158.64.235.90\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"meghannleisha.ru\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-23T01:13:13.000Z\"} ::: clientIP=158.64.235.90 ::: serverIP=158.64.235.90 ::: userName=nighthawk ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "meghannleisha.ru",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "meghannleisha.ru",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "158.64.235.90",
"serverIP": "228.60.119.90",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={"originId":410613112,"originType":"AD Users","internalIp":"158.64.235.90","externalIp":"158.64.235.90","categories":["Malware"],"tags":[],"destination":"meghannleisha.ru","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-23T01:13:13.000Z"} ::: clientIP=158.64.235.90 ::: serverIP=158.64.235.90 ::: userName=nighthawk ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={"originId":410613112,"originType":"AD Users","internalIp":"158.64.235.90","externalIp":"158.64.235.90","categories":["Malware"],"tags":[],"destination":"meghannleisha.ru","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-23T01:13:13.000Z"} ::: clientIP=158.64.235.90 ::: serverIP=158.64.235.90 ::: userName=nighthawk ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-23T01:13:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: meghannleisha.ru
messagetype: firewall_action
severitycode: 2
fqdn: meghannleisha.ru
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 158.64.235.90
serverIP: 228.60.119.90
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={"originId":410613112,"originType":"AD Users","internalIp":"240.143.30.10","externalIp":"240.143.30.10","categories":["Malware"],"tags":[],"destination":"meghannleisha.ru","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-23T01:13:13.000Z"} ::: clientIP=240.143.30.10 ::: serverIP=240.143.30.10 ::: userName=charlie ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-23T01:13:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={\"originId\":410613112,\"originType\":\"AD Users\",\"internalIp\":\"240.143.30.10\",\"externalIp\":\"240.143.30.10\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"meghannleisha.ru\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-23T01:13:13.000Z\"} ::: clientIP=240.143.30.10 ::: serverIP=240.143.30.10 ::: userName=charlie ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "meghannleisha.ru",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "meghannleisha.ru",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "240.143.30.10",
"serverIP": "153.234.25.200",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={"originId":410613112,"originType":"AD Users","internalIp":"240.143.30.10","externalIp":"240.143.30.10","categories":["Malware"],"tags":[],"destination":"meghannleisha.ru","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-23T01:13:13.000Z"} ::: clientIP=240.143.30.10 ::: serverIP=240.143.30.10 ::: userName=charlie ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={"originId":410613112,"originType":"AD Users","internalIp":"240.143.30.10","externalIp":"240.143.30.10","categories":["Malware"],"tags":[],"destination":"meghannleisha.ru","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-23T01:13:13.000Z"} ::: clientIP=240.143.30.10 ::: serverIP=240.143.30.10 ::: userName=charlie ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-23T01:13:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: meghannleisha.ru
messagetype: firewall_action
severitycode: 2
fqdn: meghannleisha.ru
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 240.143.30.10
serverIP: 153.234.25.200
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={"originId":410613112,"originType":"AD Users","internalIp":"173.3.219.185","externalIp":"173.3.219.185","categories":["Malware"],"tags":[],"destination":"meghannleisha.ru","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-23T01:13:13.000Z"} ::: clientIP=173.3.219.185 ::: serverIP=173.3.219.185 ::: userName=nighthawk ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-23T01:13:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={\"originId\":410613112,\"originType\":\"AD Users\",\"internalIp\":\"173.3.219.185\",\"externalIp\":\"173.3.219.185\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"meghannleisha.ru\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-23T01:13:13.000Z\"} ::: clientIP=173.3.219.185 ::: serverIP=173.3.219.185 ::: userName=nighthawk ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "meghannleisha.ru",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "meghannleisha.ru",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "173.3.219.185",
"serverIP": "209.164.179.215",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={"originId":410613112,"originType":"AD Users","internalIp":"173.3.219.185","externalIp":"173.3.219.185","categories":["Malware"],"tags":[],"destination":"meghannleisha.ru","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-23T01:13:13.000Z"} ::: clientIP=173.3.219.185 ::: serverIP=173.3.219.185 ::: userName=nighthawk ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=meghannleisha.ru ::: action=BLOCKED ::: message={"originId":410613112,"originType":"AD Users","internalIp":"173.3.219.185","externalIp":"173.3.219.185","categories":["Malware"],"tags":[],"destination":"meghannleisha.ru","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-23T01:13:13.000Z"} ::: clientIP=173.3.219.185 ::: serverIP=173.3.219.185 ::: userName=nighthawk ::: created_at=2022-05-23T01:13:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T01:13:13.000Z ::: serverHostname=meghannleisha.ru ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-23T01:13:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: meghannleisha.ru
messagetype: firewall_action
severitycode: 2
fqdn: meghannleisha.ru
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 173.3.219.185
serverIP: 209.164.179.215
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"2.240.138.185","externalIp":"93.212.153.3","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T10:28:37.000Z"} ::: clientIP=2.240.138.185 ::: serverIP=93.212.153.3 ::: userName=fish ::: created_at=2022-05-13T10:28:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T10:28:37.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-13T10:28:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"2.240.138.185\",\"externalIp\":\"93.212.153.3\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T10:28:37.000Z\"} ::: clientIP=2.240.138.185 ::: serverIP=93.212.153.3 ::: userName=fish ::: created_at=2022-05-13T10:28:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T10:28:37.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "bit.ly",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "bit.ly",
"vendorcode": "URL ShortenersApplicationCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "2.240.138.185",
"serverIP": "93.212.153.3",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"2.240.138.185","externalIp":"93.212.153.3","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T10:28:37.000Z"} ::: clientIP=2.240.138.185 ::: serverIP=93.212.153.3 ::: userName=fish ::: created_at=2022-05-13T10:28:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T10:28:37.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"2.240.138.185","externalIp":"93.212.153.3","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T10:28:37.000Z"} ::: clientIP=2.240.138.185 ::: serverIP=93.212.153.3 ::: userName=fish ::: created_at=2022-05-13T10:28:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T10:28:37.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-13T10:28:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: bit.ly
messagetype: firewall_action
severitycode: 2
fqdn: bit.ly
vendorcode: URL ShortenersApplicationCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 2.240.138.185
serverIP: 93.212.153.3
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"171.88.16.81","externalIp":"91.78.248.82","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-13T10:28:37.000Z"} ::: clientIP=171.88.16.81 ::: serverIP=91.78.248.82 ::: userName=nighthawk ::: created_at=2022-05-13T10:28:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T10:28:37.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-13T10:28:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"171.88.16.81\",\"externalIp\":\"91.78.248.82\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T10:28:37.000Z\"} ::: clientIP=171.88.16.81 ::: serverIP=91.78.248.82 ::: userName=nighthawk ::: created_at=2022-05-13T10:28:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T10:28:37.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "bit.ly",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "bit.ly",
"vendorcode": "URL ShortenersApplicationCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "171.88.16.81",
"serverIP": "91.78.248.82",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"171.88.16.81","externalIp":"91.78.248.82","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-13T10:28:37.000Z"} ::: clientIP=171.88.16.81 ::: serverIP=91.78.248.82 ::: userName=nighthawk ::: created_at=2022-05-13T10:28:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T10:28:37.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"171.88.16.81","externalIp":"91.78.248.82","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-13T10:28:37.000Z"} ::: clientIP=171.88.16.81 ::: serverIP=91.78.248.82 ::: userName=nighthawk ::: created_at=2022-05-13T10:28:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T10:28:37.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-13T10:28:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: bit.ly
messagetype: firewall_action
severitycode: 2
fqdn: bit.ly
vendorcode: URL ShortenersApplicationCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 171.88.16.81
serverIP: 91.78.248.82
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"90.33.30.207","externalIp":"68.63.8.64","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T10:28:37.000Z"} ::: clientIP=90.33.30.207 ::: serverIP=68.63.8.64 ::: userName=fish ::: created_at=2022-05-13T10:28:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T10:28:37.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-13T10:28:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"90.33.30.207\",\"externalIp\":\"68.63.8.64\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T10:28:37.000Z\"} ::: clientIP=90.33.30.207 ::: serverIP=68.63.8.64 ::: userName=fish ::: created_at=2022-05-13T10:28:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T10:28:37.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "bit.ly",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "bit.ly",
"vendorcode": "URL ShortenersApplicationCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "90.33.30.207",
"serverIP": "68.63.8.64",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"90.33.30.207","externalIp":"68.63.8.64","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T10:28:37.000Z"} ::: clientIP=90.33.30.207 ::: serverIP=68.63.8.64 ::: userName=fish ::: created_at=2022-05-13T10:28:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T10:28:37.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"90.33.30.207","externalIp":"68.63.8.64","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-13T10:28:37.000Z"} ::: clientIP=90.33.30.207 ::: serverIP=68.63.8.64 ::: userName=fish ::: created_at=2022-05-13T10:28:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T10:28:37.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-13T10:28:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: bit.ly
messagetype: firewall_action
severitycode: 2
fqdn: bit.ly
vendorcode: URL ShortenersApplicationCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 90.33.30.207
serverIP: 68.63.8.64
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"239.43.215.198","externalIp":"62.224.193.196","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-13T10:28:37.000Z"} ::: clientIP=239.43.215.198 ::: serverIP=62.224.193.196 ::: userName=bob ::: created_at=2022-05-13T10:28:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T10:28:37.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-13T10:28:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"239.43.215.198\",\"externalIp\":\"62.224.193.196\",\"categories\":[\"URL Shorteners\",\"Application\",\"Cryptomining\"],\"tags\":[],\"destination\":\"bit.ly\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-13T10:28:37.000Z\"} ::: clientIP=239.43.215.198 ::: serverIP=62.224.193.196 ::: userName=bob ::: created_at=2022-05-13T10:28:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T10:28:37.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "bit.ly",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "bit.ly",
"vendorcode": "URL ShortenersApplicationCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "239.43.215.198",
"serverIP": "62.224.193.196",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"239.43.215.198","externalIp":"62.224.193.196","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-13T10:28:37.000Z"} ::: clientIP=239.43.215.198 ::: serverIP=62.224.193.196 ::: userName=bob ::: created_at=2022-05-13T10:28:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T10:28:37.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=bit.ly ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"239.43.215.198","externalIp":"62.224.193.196","categories":["URL Shorteners","Application","Cryptomining"],"tags":[],"destination":"bit.ly","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-13T10:28:37.000Z"} ::: clientIP=239.43.215.198 ::: serverIP=62.224.193.196 ::: userName=bob ::: created_at=2022-05-13T10:28:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=URL ShortenersApplicationCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-13T10:28:37.000Z ::: serverHostname=bit.ly ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-13T10:28:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: bit.ly
messagetype: firewall_action
severitycode: 2
fqdn: bit.ly
vendorcode: URL ShortenersApplicationCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 239.43.215.198
serverIP: 62.224.193.196
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T12:46:27Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe\" ","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"nighthawk","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572","sha256":"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99","md5":"fbab280d0cac5e21c72f0a1a7b5b9608","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"explorer.exe","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=247.176.19.47 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe ::: userName=nighthawk ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SSTEWART-LT3.undefined",
"clientmac": "00155d4a00da",
"filehash": "15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99",
"filename": "setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-06-12T12:46:27Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\CashDeskInstall\\\\OPOSADK\\\\ADK280ER12\\\\Disk1\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\PayGo\\\\CashDeskInstall\\\\OPOSADK\\\\ADK280ER12\\\\Disk1\\\\setup.exe\\\" \",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"nighthawk\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572\",\"sha256\":\"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99\",\"md5\":\"fbab280d0cac5e21c72f0a1a7b5b9608\",\"parent_details\":{\"parent_sha256\":\"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3\",\"parent_md5\":\"d45bd7c7b7bf977246e9409d63435231\",\"parent_cmdline\":\"explorer.exe\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=247.176.19.47 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe ::: userName=nighthawk ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-06-12T12:46:27Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "247.176.19.47",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T12:46:27Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe\" ","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"nighthawk","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572","sha256":"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99","md5":"fbab280d0cac5e21c72f0a1a7b5b9608","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"explorer.exe","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=247.176.19.47 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe ::: userName=nighthawk ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T12:46:27Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe\" ","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"nighthawk","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572","sha256":"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99","md5":"fbab280d0cac5e21c72f0a1a7b5b9608","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"explorer.exe","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=247.176.19.47 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe ::: userName=nighthawk ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3.undefined
clientmac: 00155d4a00da
filehash: 15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99
filename: setup.exe
filepath: \Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-06-12T12:46:27Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 247.176.19.47
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T12:46:27Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe\" ","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572","sha256":"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99","md5":"fbab280d0cac5e21c72f0a1a7b5b9608","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"explorer.exe","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=8.52.48.202 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe ::: userName=alice ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SSTEWART-LT3.undefined",
"clientmac": "00155d4a00da",
"filehash": "15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99",
"filename": "setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-06-12T12:46:27Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\CashDeskInstall\\\\OPOSADK\\\\ADK280ER12\\\\Disk1\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\PayGo\\\\CashDeskInstall\\\\OPOSADK\\\\ADK280ER12\\\\Disk1\\\\setup.exe\\\" \",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"alice\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572\",\"sha256\":\"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99\",\"md5\":\"fbab280d0cac5e21c72f0a1a7b5b9608\",\"parent_details\":{\"parent_sha256\":\"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3\",\"parent_md5\":\"d45bd7c7b7bf977246e9409d63435231\",\"parent_cmdline\":\"explorer.exe\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=8.52.48.202 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe ::: userName=alice ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-06-12T12:46:27Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "8.52.48.202",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T12:46:27Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe\" ","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572","sha256":"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99","md5":"fbab280d0cac5e21c72f0a1a7b5b9608","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"explorer.exe","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=8.52.48.202 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe ::: userName=alice ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T12:46:27Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe\" ","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572","sha256":"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99","md5":"fbab280d0cac5e21c72f0a1a7b5b9608","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"explorer.exe","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=8.52.48.202 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe ::: userName=alice ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3.undefined
clientmac: 00155d4a00da
filehash: 15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99
filename: setup.exe
filepath: \Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-06-12T12:46:27Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 8.52.48.202
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T12:46:27Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe\" ","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572","sha256":"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99","md5":"fbab280d0cac5e21c72f0a1a7b5b9608","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"explorer.exe","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=142.26.114.10 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe ::: userName=fish ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SSTEWART-LT3.undefined",
"clientmac": "00155d4a00da",
"filehash": "15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99",
"filename": "setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-06-12T12:46:27Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\CashDeskInstall\\\\OPOSADK\\\\ADK280ER12\\\\Disk1\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\PayGo\\\\CashDeskInstall\\\\OPOSADK\\\\ADK280ER12\\\\Disk1\\\\setup.exe\\\" \",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"fish\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572\",\"sha256\":\"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99\",\"md5\":\"fbab280d0cac5e21c72f0a1a7b5b9608\",\"parent_details\":{\"parent_sha256\":\"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3\",\"parent_md5\":\"d45bd7c7b7bf977246e9409d63435231\",\"parent_cmdline\":\"explorer.exe\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=142.26.114.10 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe ::: userName=fish ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-06-12T12:46:27Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "142.26.114.10",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T12:46:27Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe\" ","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572","sha256":"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99","md5":"fbab280d0cac5e21c72f0a1a7b5b9608","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"explorer.exe","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=142.26.114.10 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe ::: userName=fish ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T12:46:27Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\PayGo\\CashDeskInstall\\OPOSADK\\ADK280ER12\\Disk1\\setup.exe\" ","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17182842475","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1606487204572","sha256":"15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99","md5":"fbab280d0cac5e21c72f0a1a7b5b9608","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"explorer.exe","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1549101992291"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=142.26.114.10 ::: fileHash=15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe ::: userName=fish ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T12:46:27Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T12:46:27Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3.undefined
clientmac: 00155d4a00da
filehash: 15ff52f3a2d8f23241bf7f8f90095ee3741e66fa177fb5b6dc729decc82a4a99
filename: setup.exe
filepath: \Device\HarddiskVolume3\PayGo\CashDeskInstall\OPOSADK\ADK280ER12\Disk1\setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-06-12T12:46:27Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 142.26.114.10
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-04-28T18:16:33Z","behavior_id":"5734","filename":"chrome.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Google\\Chrome\\Application\\chrome.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1888,i,13207831043762660145,13298087965543831545,131072 /prefetch:8","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Moscorpine Learning","tactic_id":"CSTA0004","technique":"Cloud-based ML","technique_id":"CST0008","display_name":"","description":"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.","severity":70,"confidence":70,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:12886709935","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:556881520473","sha256":"c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e","md5":"43a43c601f1b1584cdcfc1452cdcb165","parent_details":{"parent_sha256":"c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e","parent_md5":"43a43c601f1b1584cdcfc1452cdcb165","parent_cmdline":"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --restart","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:556876742408"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=138.191.193.171 ::: fileHash=c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e ::: fileName=chrome.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Google\Chrome\Application\chrome.exe ::: userName=bob ::: clientMAC=00ffc8e92fdb ::: created_at=2023-04-28T18:16:33Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-04-28T18:16:33Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SSTEWART-LT3.undefined",
"clientmac": "00ffc8e92fdb",
"filehash": "c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e",
"filename": "chrome.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files\\Google\\Chrome\\Application\\chrome.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-04-28T18:16:33Z\",\"behavior_id\":\"5734\",\"filename\":\"chrome.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\Google\\\\Chrome\\\\Application\\\\chrome.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\Google\\\\Chrome\\\\Application\\\\chrome.exe\\\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1888,i,13207831043762660145,13298087965543831545,131072 /prefetch:8\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Moscorpine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Cloud-based ML\",\"technique_id\":\"CST0008\",\"display_name\":\"\",\"description\":\"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.\",\"severity\":70,\"confidence\":70,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"bob\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:12886709935\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:556881520473\",\"sha256\":\"c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e\",\"md5\":\"43a43c601f1b1584cdcfc1452cdcb165\",\"parent_details\":{\"parent_sha256\":\"c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e\",\"parent_md5\":\"43a43c601f1b1584cdcfc1452cdcb165\",\"parent_cmdline\":\"\\\"C:\\\\Program Files\\\\Google\\\\Chrome\\\\Application\\\\chrome.exe\\\" --restart\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:556876742408\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=138.191.193.171 ::: fileHash=c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e ::: fileName=chrome.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files\\Google\\Chrome\\Application\\chrome.exe ::: userName=bob ::: clientMAC=00ffc8e92fdb ::: created_at=2023-04-28T18:16:33Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-04-28T18:16:33Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-28T18:16:33Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "138.191.193.171",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-04-28T18:16:33Z","behavior_id":"5734","filename":"chrome.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Google\\Chrome\\Application\\chrome.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1888,i,13207831043762660145,13298087965543831545,131072 /prefetch:8","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Moscorpine Learning","tactic_id":"CSTA0004","technique":"Cloud-based ML","technique_id":"CST0008","display_name":"","description":"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.","severity":70,"confidence":70,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:12886709935","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:556881520473","sha256":"c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e","md5":"43a43c601f1b1584cdcfc1452cdcb165","parent_details":{"parent_sha256":"c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e","parent_md5":"43a43c601f1b1584cdcfc1452cdcb165","parent_cmdline":"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --restart","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:556876742408"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=138.191.193.171 ::: fileHash=c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e ::: fileName=chrome.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Google\Chrome\Application\chrome.exe ::: userName=bob ::: clientMAC=00ffc8e92fdb ::: created_at=2023-04-28T18:16:33Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-04-28T18:16:33Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-04-28T18:16:33Z","behavior_id":"5734","filename":"chrome.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Google\\Chrome\\Application\\chrome.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1888,i,13207831043762660145,13298087965543831545,131072 /prefetch:8","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Moscorpine Learning","tactic_id":"CSTA0004","technique":"Cloud-based ML","technique_id":"CST0008","display_name":"","description":"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.","severity":70,"confidence":70,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:12886709935","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:556881520473","sha256":"c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e","md5":"43a43c601f1b1584cdcfc1452cdcb165","parent_details":{"parent_sha256":"c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e","parent_md5":"43a43c601f1b1584cdcfc1452cdcb165","parent_cmdline":"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --restart","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:556876742408"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=138.191.193.171 ::: fileHash=c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e ::: fileName=chrome.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Google\Chrome\Application\chrome.exe ::: userName=bob ::: clientMAC=00ffc8e92fdb ::: created_at=2023-04-28T18:16:33Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-04-28T18:16:33Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3.undefined
clientmac: 00ffc8e92fdb
filehash: c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e
filename: chrome.exe
filepath: \Device\HarddiskVolume3\Program Files\Google\Chrome\Application\chrome.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-04-28T18:16:33Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 138.191.193.171
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-04-28T18:16:33Z","behavior_id":"5734","filename":"chrome.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Google\\Chrome\\Application\\chrome.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1888,i,13207831043762660145,13298087965543831545,131072 /prefetch:8","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Moscorpine Learning","tactic_id":"CSTA0004","technique":"Cloud-based ML","technique_id":"CST0008","display_name":"","description":"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.","severity":70,"confidence":70,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:12886709935","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:556881520473","sha256":"c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e","md5":"43a43c601f1b1584cdcfc1452cdcb165","parent_details":{"parent_sha256":"c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e","parent_md5":"43a43c601f1b1584cdcfc1452cdcb165","parent_cmdline":"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --restart","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:556876742408"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=48.62.4.81 ::: fileHash=c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e ::: fileName=chrome.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Google\Chrome\Application\chrome.exe ::: userName=charlie ::: clientMAC=00ffc8e92fdb ::: created_at=2023-04-28T18:16:33Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-04-28T18:16:33Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SSTEWART-LT3.undefined",
"clientmac": "00ffc8e92fdb",
"filehash": "c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e",
"filename": "chrome.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files\\Google\\Chrome\\Application\\chrome.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-04-28T18:16:33Z\",\"behavior_id\":\"5734\",\"filename\":\"chrome.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\Google\\\\Chrome\\\\Application\\\\chrome.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\Google\\\\Chrome\\\\Application\\\\chrome.exe\\\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1888,i,13207831043762660145,13298087965543831545,131072 /prefetch:8\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Moscorpine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Cloud-based ML\",\"technique_id\":\"CST0008\",\"display_name\":\"\",\"description\":\"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.\",\"severity\":70,\"confidence\":70,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"charlie\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:12886709935\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:556881520473\",\"sha256\":\"c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e\",\"md5\":\"43a43c601f1b1584cdcfc1452cdcb165\",\"parent_details\":{\"parent_sha256\":\"c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e\",\"parent_md5\":\"43a43c601f1b1584cdcfc1452cdcb165\",\"parent_cmdline\":\"\\\"C:\\\\Program Files\\\\Google\\\\Chrome\\\\Application\\\\chrome.exe\\\" --restart\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:556876742408\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=48.62.4.81 ::: fileHash=c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e ::: fileName=chrome.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files\\Google\\Chrome\\Application\\chrome.exe ::: userName=charlie ::: clientMAC=00ffc8e92fdb ::: created_at=2023-04-28T18:16:33Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-04-28T18:16:33Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-28T18:16:33Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "48.62.4.81",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-04-28T18:16:33Z","behavior_id":"5734","filename":"chrome.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Google\\Chrome\\Application\\chrome.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1888,i,13207831043762660145,13298087965543831545,131072 /prefetch:8","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Moscorpine Learning","tactic_id":"CSTA0004","technique":"Cloud-based ML","technique_id":"CST0008","display_name":"","description":"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.","severity":70,"confidence":70,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:12886709935","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:556881520473","sha256":"c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e","md5":"43a43c601f1b1584cdcfc1452cdcb165","parent_details":{"parent_sha256":"c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e","parent_md5":"43a43c601f1b1584cdcfc1452cdcb165","parent_cmdline":"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --restart","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:556876742408"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=48.62.4.81 ::: fileHash=c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e ::: fileName=chrome.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Google\Chrome\Application\chrome.exe ::: userName=charlie ::: clientMAC=00ffc8e92fdb ::: created_at=2023-04-28T18:16:33Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-04-28T18:16:33Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-04-28T18:16:33Z","behavior_id":"5734","filename":"chrome.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Google\\Chrome\\Application\\chrome.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1888,i,13207831043762660145,13298087965543831545,131072 /prefetch:8","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Moscorpine Learning","tactic_id":"CSTA0004","technique":"Cloud-based ML","technique_id":"CST0008","display_name":"","description":"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.","severity":70,"confidence":70,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:12886709935","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:556881520473","sha256":"c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e","md5":"43a43c601f1b1584cdcfc1452cdcb165","parent_details":{"parent_sha256":"c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e","parent_md5":"43a43c601f1b1584cdcfc1452cdcb165","parent_cmdline":"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --restart","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:556876742408"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=48.62.4.81 ::: fileHash=c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e ::: fileName=chrome.exe ::: filePath=\Device\HarddiskVolume3\Program Files\Google\Chrome\Application\chrome.exe ::: userName=charlie ::: clientMAC=00ffc8e92fdb ::: created_at=2023-04-28T18:16:33Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-04-28T18:16:33Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3.undefined
clientmac: 00ffc8e92fdb
filehash: c0c9b49dfdfeb829001924231ed9a1cdaf1c239cfb5f0810e2367dd2959a9f0e
filename: chrome.exe
filepath: \Device\HarddiskVolume3\Program Files\Google\Chrome\Application\chrome.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-04-28T18:16:33Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 48.62.4.81
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Adrienne Smith | PBC - SBA","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u5mbsczwH21Ko9j697","status":"ACTIVE","created":"2023-05-25T18:28:15.000Z","activated":"2023-05-25T18:28:17.000Z","statusChanged":"2023-09-27T15:14:21.000Z","lastLogin":"2023-12-28T20:26:08.000Z","lastUpdated":"2023-09-27T15:14:21.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Adrienne","lastName":"Smith","primaryPhone":"(760) 759-1740","immutableID":"9VJ0uASRo0G4SDz/Hil6sA==","mobilePhone":null,"displayName":"Adrienne Smith","countryCode":"US","secondEmail":null,"title":"Sr. SBA Loan Administrator","department":"PBC - SBA","login":"alice","email":"alice"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u5mbsczwH21Ko9j697","type":"User","alternateId":"alice","displayName":"Adrienne Smith","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0","os":"Windows 10","browser":"CHROMIUM_EDGE"},"zone":"null","device":"Computer","id":null,"ipAddress":"248.210.83.126","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idx8sPKagQnRveQsM6hratk-g"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-12-28T20:25:39.978Z","securityContext":{"asNumber":22773,"asOrg":"cox communications","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"9337faeefdbe15a87a129ce09ee8c01c","deviceFingerprint":"4983dc04f7ca56f1a2f8785ba2961804","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.13.1","requestId":"e21d871e03ff3728993ac22fa2b53c20","dtHash":"00dad46046a998611b66c7870e43e80b9b9c339e601be7715def0769c7420610","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"e21d871e03ff3728993ac22fa2b53c20","detail":{}},"uuid":"44639f1c-a5bf-11ee-a466-43b26a813526","version":"0","request":{"ipChain":[{"ip":"248.210.83.126","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}},"version":"V4","source":null}]},"target":[{"id":"laept6o4gq58bWnXP696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa2kbwyr3wK2PkBt697","type":"AppInstance","alternateId":"Microsoft 365 Portal","displayName":"Microsoft 365 Portal","detailEntry":null}]}} ::: program=CHROMIUM_EDGE ::: clientIP=248.210.83.126 ::: userName=alice ::: geoRegion=United States ::: created_at=2023-12-28T20:25:39.978Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=User login to Okta\",\"userDisplay=Adrienne Smith | PBC - SBA\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u5mbsczwH21Ko9j697\",\"status\":\"ACTIVE\",\"created\":\"2023-05-25T18:28:15.000Z\",\"activated\":\"2023-05-25T18:28:17.000Z\",\"statusChanged\":\"2023-09-27T15:14:21.000Z\",\"lastLogin\":\"2023-12-28T20:26:08.000Z\",\"lastUpdated\":\"2023-09-27T15:14:21.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"Adrienne\",\"lastName\":\"Smith\",\"primaryPhone\":\"(760) 759-1740\",\"immutableID\":\"9VJ0uASRo0G4SDz/Hil6sA==\",\"mobilePhone\":null,\"displayName\":\"Adrienne Smith\",\"countryCode\":\"US\",\"secondEmail\":null,\"title\":\"Sr. SBA Loan Administrator\",\"department\":\"PBC - SBA\",\"login\":\"alice\",\"email\":\"alice\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697\"},\"resetFactors\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u5mbsczwH21Ko9j697\",\"type\":\"User\",\"alternateId\":\"alice\",\"displayName\":\"Adrienne Smith\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0\",\"os\":\"Windows 10\",\"browser\":\"CHROMIUM_EDGE\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":null,\"ipAddress\":\"248.210.83.126\",\"geographicalContext\":{\"city\":\"Chula Vista\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"91911\",\"geolocation\":{\"lat\":32.6065,\"lon\":-117.058}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idx8sPKagQnRveQsM6hratk-g\"},\"displayMessage\":\"User login to Okta\",\"eventType\":\"user.session.start\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"INVALID_CREDENTIALS\"},\"published\":\"2023-12-28T20:25:39.978Z\",\"securityContext\":{\"asNumber\":22773,\"asOrg\":\"cox communications\",\"isp\":\"cox communications inc.\",\"domain\":\"cox.net\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"9337faeefdbe15a87a129ce09ee8c01c\",\"deviceFingerprint\":\"4983dc04f7ca56f1a2f8785ba2961804\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.13.1\",\"requestId\":\"e21d871e03ff3728993ac22fa2b53c20\",\"dtHash\":\"00dad46046a998611b66c7870e43e80b9b9c339e601be7715def0769c7420610\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\",\"logOnlySecurityData\":\"{\\\"risk\\\":{\\\"level\\\":\\\"LOW\\\"},\\\"behaviors\\\":{\\\"New Geo-Location\\\":\\\"NEGATIVE\\\",\\\"New Device\\\":\\\"NEGATIVE\\\",\\\"New IP\\\":\\\"NEGATIVE\\\",\\\"New State\\\":\\\"NEGATIVE\\\",\\\"New Country\\\":\\\"NEGATIVE\\\",\\\"Velocity\\\":\\\"NEGATIVE\\\",\\\"New City\\\":\\\"NEGATIVE\\\"}}\"}},\"legacyEventType\":\"core.user_auth.login_failed\",\"transaction\":{\"type\":\"WEB\",\"id\":\"e21d871e03ff3728993ac22fa2b53c20\",\"detail\":{}},\"uuid\":\"44639f1c-a5bf-11ee-a466-43b26a813526\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"248.210.83.126\",\"geographicalContext\":{\"city\":\"Chula Vista\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"91911\",\"geolocation\":{\"lat\":32.6065,\"lon\":-117.058}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"laept6o4gq58bWnXP696\",\"type\":\"AuthenticatorEnrollment\",\"alternateId\":\"unknown\",\"displayName\":\"Password\",\"detailEntry\":null},{\"id\":\"0oa2kbwyr3wK2PkBt697\",\"type\":\"AppInstance\",\"alternateId\":\"Microsoft 365 Portal\",\"displayName\":\"Microsoft 365 Portal\",\"detailEntry\":null}]}} ::: program=CHROMIUM_EDGE ::: clientIP=248.210.83.126 ::: userName=alice ::: geoRegion=United States ::: created_at=2023-12-28T20:25:39.978Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "CHROMIUM_EDGE",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 3,
"severitylabel": "error",
"sourceinfo": "unknown",
"tags": [
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"description=User login to Okta",
"userDisplay=Adrienne Smith | PBC - SBA",
"auth_failure"
],
"vendorcode": "user.session.start",
"streamName": "Okta",
"clientIP": "248.210.83.126",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Adrienne Smith | PBC - SBA","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u5mbsczwH21Ko9j697","status":"ACTIVE","created":"2023-05-25T18:28:15.000Z","activated":"2023-05-25T18:28:17.000Z","statusChanged":"2023-09-27T15:14:21.000Z","lastLogin":"2023-12-28T20:26:08.000Z","lastUpdated":"2023-09-27T15:14:21.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Adrienne","lastName":"Smith","primaryPhone":"(760) 759-1740","immutableID":"9VJ0uASRo0G4SDz/Hil6sA==","mobilePhone":null,"displayName":"Adrienne Smith","countryCode":"US","secondEmail":null,"title":"Sr. SBA Loan Administrator","department":"PBC - SBA","login":"alice","email":"alice"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u5mbsczwH21Ko9j697","type":"User","alternateId":"alice","displayName":"Adrienne Smith","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0","os":"Windows 10","browser":"CHROMIUM_EDGE"},"zone":"null","device":"Computer","id":null,"ipAddress":"248.210.83.126","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idx8sPKagQnRveQsM6hratk-g"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-12-28T20:25:39.978Z","securityContext":{"asNumber":22773,"asOrg":"cox communications","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"9337faeefdbe15a87a129ce09ee8c01c","deviceFingerprint":"4983dc04f7ca56f1a2f8785ba2961804","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.13.1","requestId":"e21d871e03ff3728993ac22fa2b53c20","dtHash":"00dad46046a998611b66c7870e43e80b9b9c339e601be7715def0769c7420610","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"e21d871e03ff3728993ac22fa2b53c20","detail":{}},"uuid":"44639f1c-a5bf-11ee-a466-43b26a813526","version":"0","request":{"ipChain":[{"ip":"248.210.83.126","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}},"version":"V4","source":null}]},"target":[{"id":"laept6o4gq58bWnXP696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa2kbwyr3wK2PkBt697","type":"AppInstance","alternateId":"Microsoft 365 Portal","displayName":"Microsoft 365 Portal","detailEntry":null}]}} ::: program=CHROMIUM_EDGE ::: clientIP=248.210.83.126 ::: userName=alice ::: geoRegion=United States ::: created_at=2023-12-28T20:25:39.978Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Adrienne Smith | PBC - SBA","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u5mbsczwH21Ko9j697","status":"ACTIVE","created":"2023-05-25T18:28:15.000Z","activated":"2023-05-25T18:28:17.000Z","statusChanged":"2023-09-27T15:14:21.000Z","lastLogin":"2023-12-28T20:26:08.000Z","lastUpdated":"2023-09-27T15:14:21.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Adrienne","lastName":"Smith","primaryPhone":"(760) 759-1740","immutableID":"9VJ0uASRo0G4SDz/Hil6sA==","mobilePhone":null,"displayName":"Adrienne Smith","countryCode":"US","secondEmail":null,"title":"Sr. SBA Loan Administrator","department":"PBC - SBA","login":"alice","email":"alice"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u5mbsczwH21Ko9j697","type":"User","alternateId":"alice","displayName":"Adrienne Smith","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0","os":"Windows 10","browser":"CHROMIUM_EDGE"},"zone":"null","device":"Computer","id":null,"ipAddress":"248.210.83.126","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idx8sPKagQnRveQsM6hratk-g"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-12-28T20:25:39.978Z","securityContext":{"asNumber":22773,"asOrg":"cox communications","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"9337faeefdbe15a87a129ce09ee8c01c","deviceFingerprint":"4983dc04f7ca56f1a2f8785ba2961804","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.13.1","requestId":"e21d871e03ff3728993ac22fa2b53c20","dtHash":"00dad46046a998611b66c7870e43e80b9b9c339e601be7715def0769c7420610","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"e21d871e03ff3728993ac22fa2b53c20","detail":{}},"uuid":"44639f1c-a5bf-11ee-a466-43b26a813526","version":"0","request":{"ipChain":[{"ip":"248.210.83.126","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}},"version":"V4","source":null}]},"target":[{"id":"laept6o4gq58bWnXP696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa2kbwyr3wK2PkBt697","type":"AppInstance","alternateId":"Microsoft 365 Portal","displayName":"Microsoft 365 Portal","detailEntry":null}]}} ::: program=CHROMIUM_EDGE ::: clientIP=248.210.83.126 ::: userName=alice ::: geoRegion=United States ::: created_at=2023-12-28T20:25:39.978Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: CHROMIUM_EDGE
senderhost: kafka.precinct
sensitivity: normal
severitycode: 3
severitylabel: error
sourceinfo: unknown
tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=User login to Okta', 'userDisplay=Adrienne Smith | PBC - SBA', 'auth_failure']
vendorcode: user.session.start
streamName: Okta
clientIP: 248.210.83.126
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Adrienne Smith | PBC - SBA","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u5mbsczwH21Ko9j697","status":"ACTIVE","created":"2023-05-25T18:28:15.000Z","activated":"2023-05-25T18:28:17.000Z","statusChanged":"2023-09-27T15:14:21.000Z","lastLogin":"2023-12-28T20:26:08.000Z","lastUpdated":"2023-09-27T15:14:21.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Adrienne","lastName":"Smith","primaryPhone":"(760) 759-1740","immutableID":"9VJ0uASRo0G4SDz/Hil6sA==","mobilePhone":null,"displayName":"Adrienne Smith","countryCode":"US","secondEmail":null,"title":"Sr. SBA Loan Administrator","department":"PBC - SBA","login":"charlie","email":"charlie"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u5mbsczwH21Ko9j697","type":"User","alternateId":"charlie","displayName":"Adrienne Smith","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0","os":"Windows 10","browser":"CHROMIUM_EDGE"},"zone":"null","device":"Computer","id":null,"ipAddress":"222.7.13.225","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idx8sPKagQnRveQsM6hratk-g"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-12-28T20:25:39.978Z","securityContext":{"asNumber":22773,"asOrg":"cox communications","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"9337faeefdbe15a87a129ce09ee8c01c","deviceFingerprint":"4983dc04f7ca56f1a2f8785ba2961804","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.13.1","requestId":"e21d871e03ff3728993ac22fa2b53c20","dtHash":"00dad46046a998611b66c7870e43e80b9b9c339e601be7715def0769c7420610","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"e21d871e03ff3728993ac22fa2b53c20","detail":{}},"uuid":"44639f1c-a5bf-11ee-a466-43b26a813526","version":"0","request":{"ipChain":[{"ip":"222.7.13.225","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}},"version":"V4","source":null}]},"target":[{"id":"laept6o4gq58bWnXP696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa2kbwyr3wK2PkBt697","type":"AppInstance","alternateId":"Microsoft 365 Portal","displayName":"Microsoft 365 Portal","detailEntry":null}]}} ::: program=CHROMIUM_EDGE ::: clientIP=222.7.13.225 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-12-28T20:25:39.978Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=User login to Okta\",\"userDisplay=Adrienne Smith | PBC - SBA\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u5mbsczwH21Ko9j697\",\"status\":\"ACTIVE\",\"created\":\"2023-05-25T18:28:15.000Z\",\"activated\":\"2023-05-25T18:28:17.000Z\",\"statusChanged\":\"2023-09-27T15:14:21.000Z\",\"lastLogin\":\"2023-12-28T20:26:08.000Z\",\"lastUpdated\":\"2023-09-27T15:14:21.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"Adrienne\",\"lastName\":\"Smith\",\"primaryPhone\":\"(760) 759-1740\",\"immutableID\":\"9VJ0uASRo0G4SDz/Hil6sA==\",\"mobilePhone\":null,\"displayName\":\"Adrienne Smith\",\"countryCode\":\"US\",\"secondEmail\":null,\"title\":\"Sr. SBA Loan Administrator\",\"department\":\"PBC - SBA\",\"login\":\"charlie\",\"email\":\"charlie\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697\"},\"resetFactors\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u5mbsczwH21Ko9j697\",\"type\":\"User\",\"alternateId\":\"charlie\",\"displayName\":\"Adrienne Smith\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0\",\"os\":\"Windows 10\",\"browser\":\"CHROMIUM_EDGE\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":null,\"ipAddress\":\"222.7.13.225\",\"geographicalContext\":{\"city\":\"Chula Vista\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"91911\",\"geolocation\":{\"lat\":32.6065,\"lon\":-117.058}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idx8sPKagQnRveQsM6hratk-g\"},\"displayMessage\":\"User login to Okta\",\"eventType\":\"user.session.start\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"INVALID_CREDENTIALS\"},\"published\":\"2023-12-28T20:25:39.978Z\",\"securityContext\":{\"asNumber\":22773,\"asOrg\":\"cox communications\",\"isp\":\"cox communications inc.\",\"domain\":\"cox.net\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"9337faeefdbe15a87a129ce09ee8c01c\",\"deviceFingerprint\":\"4983dc04f7ca56f1a2f8785ba2961804\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.13.1\",\"requestId\":\"e21d871e03ff3728993ac22fa2b53c20\",\"dtHash\":\"00dad46046a998611b66c7870e43e80b9b9c339e601be7715def0769c7420610\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\",\"logOnlySecurityData\":\"{\\\"risk\\\":{\\\"level\\\":\\\"LOW\\\"},\\\"behaviors\\\":{\\\"New Geo-Location\\\":\\\"NEGATIVE\\\",\\\"New Device\\\":\\\"NEGATIVE\\\",\\\"New IP\\\":\\\"NEGATIVE\\\",\\\"New State\\\":\\\"NEGATIVE\\\",\\\"New Country\\\":\\\"NEGATIVE\\\",\\\"Velocity\\\":\\\"NEGATIVE\\\",\\\"New City\\\":\\\"NEGATIVE\\\"}}\"}},\"legacyEventType\":\"core.user_auth.login_failed\",\"transaction\":{\"type\":\"WEB\",\"id\":\"e21d871e03ff3728993ac22fa2b53c20\",\"detail\":{}},\"uuid\":\"44639f1c-a5bf-11ee-a466-43b26a813526\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"222.7.13.225\",\"geographicalContext\":{\"city\":\"Chula Vista\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"91911\",\"geolocation\":{\"lat\":32.6065,\"lon\":-117.058}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"laept6o4gq58bWnXP696\",\"type\":\"AuthenticatorEnrollment\",\"alternateId\":\"unknown\",\"displayName\":\"Password\",\"detailEntry\":null},{\"id\":\"0oa2kbwyr3wK2PkBt697\",\"type\":\"AppInstance\",\"alternateId\":\"Microsoft 365 Portal\",\"displayName\":\"Microsoft 365 Portal\",\"detailEntry\":null}]}} ::: program=CHROMIUM_EDGE ::: clientIP=222.7.13.225 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-12-28T20:25:39.978Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "CHROMIUM_EDGE",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 3,
"severitylabel": "error",
"sourceinfo": "unknown",
"tags": [
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"description=User login to Okta",
"userDisplay=Adrienne Smith | PBC - SBA",
"auth_failure"
],
"vendorcode": "user.session.start",
"streamName": "Okta",
"clientIP": "222.7.13.225",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Adrienne Smith | PBC - SBA","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u5mbsczwH21Ko9j697","status":"ACTIVE","created":"2023-05-25T18:28:15.000Z","activated":"2023-05-25T18:28:17.000Z","statusChanged":"2023-09-27T15:14:21.000Z","lastLogin":"2023-12-28T20:26:08.000Z","lastUpdated":"2023-09-27T15:14:21.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Adrienne","lastName":"Smith","primaryPhone":"(760) 759-1740","immutableID":"9VJ0uASRo0G4SDz/Hil6sA==","mobilePhone":null,"displayName":"Adrienne Smith","countryCode":"US","secondEmail":null,"title":"Sr. SBA Loan Administrator","department":"PBC - SBA","login":"charlie","email":"charlie"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u5mbsczwH21Ko9j697","type":"User","alternateId":"charlie","displayName":"Adrienne Smith","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0","os":"Windows 10","browser":"CHROMIUM_EDGE"},"zone":"null","device":"Computer","id":null,"ipAddress":"222.7.13.225","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idx8sPKagQnRveQsM6hratk-g"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-12-28T20:25:39.978Z","securityContext":{"asNumber":22773,"asOrg":"cox communications","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"9337faeefdbe15a87a129ce09ee8c01c","deviceFingerprint":"4983dc04f7ca56f1a2f8785ba2961804","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.13.1","requestId":"e21d871e03ff3728993ac22fa2b53c20","dtHash":"00dad46046a998611b66c7870e43e80b9b9c339e601be7715def0769c7420610","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"e21d871e03ff3728993ac22fa2b53c20","detail":{}},"uuid":"44639f1c-a5bf-11ee-a466-43b26a813526","version":"0","request":{"ipChain":[{"ip":"222.7.13.225","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}},"version":"V4","source":null}]},"target":[{"id":"laept6o4gq58bWnXP696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa2kbwyr3wK2PkBt697","type":"AppInstance","alternateId":"Microsoft 365 Portal","displayName":"Microsoft 365 Portal","detailEntry":null}]}} ::: program=CHROMIUM_EDGE ::: clientIP=222.7.13.225 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-12-28T20:25:39.978Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Adrienne Smith | PBC - SBA","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u5mbsczwH21Ko9j697","status":"ACTIVE","created":"2023-05-25T18:28:15.000Z","activated":"2023-05-25T18:28:17.000Z","statusChanged":"2023-09-27T15:14:21.000Z","lastLogin":"2023-12-28T20:26:08.000Z","lastUpdated":"2023-09-27T15:14:21.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Adrienne","lastName":"Smith","primaryPhone":"(760) 759-1740","immutableID":"9VJ0uASRo0G4SDz/Hil6sA==","mobilePhone":null,"displayName":"Adrienne Smith","countryCode":"US","secondEmail":null,"title":"Sr. SBA Loan Administrator","department":"PBC - SBA","login":"charlie","email":"charlie"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u5mbsczwH21Ko9j697","type":"User","alternateId":"charlie","displayName":"Adrienne Smith","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0","os":"Windows 10","browser":"CHROMIUM_EDGE"},"zone":"null","device":"Computer","id":null,"ipAddress":"222.7.13.225","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idx8sPKagQnRveQsM6hratk-g"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-12-28T20:25:39.978Z","securityContext":{"asNumber":22773,"asOrg":"cox communications","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"9337faeefdbe15a87a129ce09ee8c01c","deviceFingerprint":"4983dc04f7ca56f1a2f8785ba2961804","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.13.1","requestId":"e21d871e03ff3728993ac22fa2b53c20","dtHash":"00dad46046a998611b66c7870e43e80b9b9c339e601be7715def0769c7420610","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"e21d871e03ff3728993ac22fa2b53c20","detail":{}},"uuid":"44639f1c-a5bf-11ee-a466-43b26a813526","version":"0","request":{"ipChain":[{"ip":"222.7.13.225","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}},"version":"V4","source":null}]},"target":[{"id":"laept6o4gq58bWnXP696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa2kbwyr3wK2PkBt697","type":"AppInstance","alternateId":"Microsoft 365 Portal","displayName":"Microsoft 365 Portal","detailEntry":null}]}} ::: program=CHROMIUM_EDGE ::: clientIP=222.7.13.225 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-12-28T20:25:39.978Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: CHROMIUM_EDGE
senderhost: kafka.precinct
sensitivity: normal
severitycode: 3
severitylabel: error
sourceinfo: unknown
tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=User login to Okta', 'userDisplay=Adrienne Smith | PBC - SBA', 'auth_failure']
vendorcode: user.session.start
streamName: Okta
clientIP: 222.7.13.225
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Adrienne Smith | PBC - SBA","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u5mbsczwH21Ko9j697","status":"ACTIVE","created":"2023-05-25T18:28:15.000Z","activated":"2023-05-25T18:28:17.000Z","statusChanged":"2023-09-27T15:14:21.000Z","lastLogin":"2023-12-28T20:26:08.000Z","lastUpdated":"2023-09-27T15:14:21.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Adrienne","lastName":"Smith","primaryPhone":"(760) 759-1740","immutableID":"9VJ0uASRo0G4SDz/Hil6sA==","mobilePhone":null,"displayName":"Adrienne Smith","countryCode":"US","secondEmail":null,"title":"Sr. SBA Loan Administrator","department":"PBC - SBA","login":"fish","email":"fish"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u5mbsczwH21Ko9j697","type":"User","alternateId":"fish","displayName":"Adrienne Smith","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0","os":"Windows 10","browser":"CHROMIUM_EDGE"},"zone":"null","device":"Computer","id":null,"ipAddress":"174.128.130.158","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idx8sPKagQnRveQsM6hratk-g"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-12-28T20:25:39.978Z","securityContext":{"asNumber":22773,"asOrg":"cox communications","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"9337faeefdbe15a87a129ce09ee8c01c","deviceFingerprint":"4983dc04f7ca56f1a2f8785ba2961804","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.13.1","requestId":"e21d871e03ff3728993ac22fa2b53c20","dtHash":"00dad46046a998611b66c7870e43e80b9b9c339e601be7715def0769c7420610","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"e21d871e03ff3728993ac22fa2b53c20","detail":{}},"uuid":"44639f1c-a5bf-11ee-a466-43b26a813526","version":"0","request":{"ipChain":[{"ip":"174.128.130.158","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}},"version":"V4","source":null}]},"target":[{"id":"laept6o4gq58bWnXP696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa2kbwyr3wK2PkBt697","type":"AppInstance","alternateId":"Microsoft 365 Portal","displayName":"Microsoft 365 Portal","detailEntry":null}]}} ::: program=CHROMIUM_EDGE ::: clientIP=174.128.130.158 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-12-28T20:25:39.978Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=User login to Okta\",\"userDisplay=Adrienne Smith | PBC - SBA\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u5mbsczwH21Ko9j697\",\"status\":\"ACTIVE\",\"created\":\"2023-05-25T18:28:15.000Z\",\"activated\":\"2023-05-25T18:28:17.000Z\",\"statusChanged\":\"2023-09-27T15:14:21.000Z\",\"lastLogin\":\"2023-12-28T20:26:08.000Z\",\"lastUpdated\":\"2023-09-27T15:14:21.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"Adrienne\",\"lastName\":\"Smith\",\"primaryPhone\":\"(760) 759-1740\",\"immutableID\":\"9VJ0uASRo0G4SDz/Hil6sA==\",\"mobilePhone\":null,\"displayName\":\"Adrienne Smith\",\"countryCode\":\"US\",\"secondEmail\":null,\"title\":\"Sr. SBA Loan Administrator\",\"department\":\"PBC - SBA\",\"login\":\"fish\",\"email\":\"fish\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697\"},\"resetFactors\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u5mbsczwH21Ko9j697\",\"type\":\"User\",\"alternateId\":\"fish\",\"displayName\":\"Adrienne Smith\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0\",\"os\":\"Windows 10\",\"browser\":\"CHROMIUM_EDGE\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":null,\"ipAddress\":\"174.128.130.158\",\"geographicalContext\":{\"city\":\"Chula Vista\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"91911\",\"geolocation\":{\"lat\":32.6065,\"lon\":-117.058}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idx8sPKagQnRveQsM6hratk-g\"},\"displayMessage\":\"User login to Okta\",\"eventType\":\"user.session.start\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"INVALID_CREDENTIALS\"},\"published\":\"2023-12-28T20:25:39.978Z\",\"securityContext\":{\"asNumber\":22773,\"asOrg\":\"cox communications\",\"isp\":\"cox communications inc.\",\"domain\":\"cox.net\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"9337faeefdbe15a87a129ce09ee8c01c\",\"deviceFingerprint\":\"4983dc04f7ca56f1a2f8785ba2961804\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.13.1\",\"requestId\":\"e21d871e03ff3728993ac22fa2b53c20\",\"dtHash\":\"00dad46046a998611b66c7870e43e80b9b9c339e601be7715def0769c7420610\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\",\"logOnlySecurityData\":\"{\\\"risk\\\":{\\\"level\\\":\\\"LOW\\\"},\\\"behaviors\\\":{\\\"New Geo-Location\\\":\\\"NEGATIVE\\\",\\\"New Device\\\":\\\"NEGATIVE\\\",\\\"New IP\\\":\\\"NEGATIVE\\\",\\\"New State\\\":\\\"NEGATIVE\\\",\\\"New Country\\\":\\\"NEGATIVE\\\",\\\"Velocity\\\":\\\"NEGATIVE\\\",\\\"New City\\\":\\\"NEGATIVE\\\"}}\"}},\"legacyEventType\":\"core.user_auth.login_failed\",\"transaction\":{\"type\":\"WEB\",\"id\":\"e21d871e03ff3728993ac22fa2b53c20\",\"detail\":{}},\"uuid\":\"44639f1c-a5bf-11ee-a466-43b26a813526\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"174.128.130.158\",\"geographicalContext\":{\"city\":\"Chula Vista\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"91911\",\"geolocation\":{\"lat\":32.6065,\"lon\":-117.058}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"laept6o4gq58bWnXP696\",\"type\":\"AuthenticatorEnrollment\",\"alternateId\":\"unknown\",\"displayName\":\"Password\",\"detailEntry\":null},{\"id\":\"0oa2kbwyr3wK2PkBt697\",\"type\":\"AppInstance\",\"alternateId\":\"Microsoft 365 Portal\",\"displayName\":\"Microsoft 365 Portal\",\"detailEntry\":null}]}} ::: program=CHROMIUM_EDGE ::: clientIP=174.128.130.158 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-12-28T20:25:39.978Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "CHROMIUM_EDGE",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 3,
"severitylabel": "error",
"sourceinfo": "unknown",
"tags": [
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"description=User login to Okta",
"userDisplay=Adrienne Smith | PBC - SBA",
"auth_failure"
],
"vendorcode": "user.session.start",
"streamName": "Okta",
"clientIP": "174.128.130.158",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Adrienne Smith | PBC - SBA","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u5mbsczwH21Ko9j697","status":"ACTIVE","created":"2023-05-25T18:28:15.000Z","activated":"2023-05-25T18:28:17.000Z","statusChanged":"2023-09-27T15:14:21.000Z","lastLogin":"2023-12-28T20:26:08.000Z","lastUpdated":"2023-09-27T15:14:21.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Adrienne","lastName":"Smith","primaryPhone":"(760) 759-1740","immutableID":"9VJ0uASRo0G4SDz/Hil6sA==","mobilePhone":null,"displayName":"Adrienne Smith","countryCode":"US","secondEmail":null,"title":"Sr. SBA Loan Administrator","department":"PBC - SBA","login":"fish","email":"fish"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u5mbsczwH21Ko9j697","type":"User","alternateId":"fish","displayName":"Adrienne Smith","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0","os":"Windows 10","browser":"CHROMIUM_EDGE"},"zone":"null","device":"Computer","id":null,"ipAddress":"174.128.130.158","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idx8sPKagQnRveQsM6hratk-g"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-12-28T20:25:39.978Z","securityContext":{"asNumber":22773,"asOrg":"cox communications","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"9337faeefdbe15a87a129ce09ee8c01c","deviceFingerprint":"4983dc04f7ca56f1a2f8785ba2961804","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.13.1","requestId":"e21d871e03ff3728993ac22fa2b53c20","dtHash":"00dad46046a998611b66c7870e43e80b9b9c339e601be7715def0769c7420610","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"e21d871e03ff3728993ac22fa2b53c20","detail":{}},"uuid":"44639f1c-a5bf-11ee-a466-43b26a813526","version":"0","request":{"ipChain":[{"ip":"174.128.130.158","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}},"version":"V4","source":null}]},"target":[{"id":"laept6o4gq58bWnXP696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa2kbwyr3wK2PkBt697","type":"AppInstance","alternateId":"Microsoft 365 Portal","displayName":"Microsoft 365 Portal","detailEntry":null}]}} ::: program=CHROMIUM_EDGE ::: clientIP=174.128.130.158 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-12-28T20:25:39.978Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Adrienne Smith | PBC - SBA","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u5mbsczwH21Ko9j697","status":"ACTIVE","created":"2023-05-25T18:28:15.000Z","activated":"2023-05-25T18:28:17.000Z","statusChanged":"2023-09-27T15:14:21.000Z","lastLogin":"2023-12-28T20:26:08.000Z","lastUpdated":"2023-09-27T15:14:21.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Adrienne","lastName":"Smith","primaryPhone":"(760) 759-1740","immutableID":"9VJ0uASRo0G4SDz/Hil6sA==","mobilePhone":null,"displayName":"Adrienne Smith","countryCode":"US","secondEmail":null,"title":"Sr. SBA Loan Administrator","department":"PBC - SBA","login":"fish","email":"fish"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u5mbsczwH21Ko9j697","type":"User","alternateId":"fish","displayName":"Adrienne Smith","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0","os":"Windows 10","browser":"CHROMIUM_EDGE"},"zone":"null","device":"Computer","id":null,"ipAddress":"174.128.130.158","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idx8sPKagQnRveQsM6hratk-g"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-12-28T20:25:39.978Z","securityContext":{"asNumber":22773,"asOrg":"cox communications","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"9337faeefdbe15a87a129ce09ee8c01c","deviceFingerprint":"4983dc04f7ca56f1a2f8785ba2961804","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.13.1","requestId":"e21d871e03ff3728993ac22fa2b53c20","dtHash":"00dad46046a998611b66c7870e43e80b9b9c339e601be7715def0769c7420610","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"e21d871e03ff3728993ac22fa2b53c20","detail":{}},"uuid":"44639f1c-a5bf-11ee-a466-43b26a813526","version":"0","request":{"ipChain":[{"ip":"174.128.130.158","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}},"version":"V4","source":null}]},"target":[{"id":"laept6o4gq58bWnXP696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa2kbwyr3wK2PkBt697","type":"AppInstance","alternateId":"Microsoft 365 Portal","displayName":"Microsoft 365 Portal","detailEntry":null}]}} ::: program=CHROMIUM_EDGE ::: clientIP=174.128.130.158 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-12-28T20:25:39.978Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: CHROMIUM_EDGE
senderhost: kafka.precinct
sensitivity: normal
severitycode: 3
severitylabel: error
sourceinfo: unknown
tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=User login to Okta', 'userDisplay=Adrienne Smith | PBC - SBA', 'auth_failure']
vendorcode: user.session.start
streamName: Okta
clientIP: 174.128.130.158
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Adrienne Smith | PBC - SBA","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u5mbsczwH21Ko9j697","status":"ACTIVE","created":"2023-05-25T18:28:15.000Z","activated":"2023-05-25T18:28:17.000Z","statusChanged":"2023-09-27T15:14:21.000Z","lastLogin":"2023-12-28T20:26:08.000Z","lastUpdated":"2023-09-27T15:14:21.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Adrienne","lastName":"Smith","primaryPhone":"(760) 759-1740","immutableID":"9VJ0uASRo0G4SDz/Hil6sA==","mobilePhone":null,"displayName":"Adrienne Smith","countryCode":"US","secondEmail":null,"title":"Sr. SBA Loan Administrator","department":"PBC - SBA","login":"nighthawk","email":"nighthawk"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u5mbsczwH21Ko9j697","type":"User","alternateId":"nighthawk","displayName":"Adrienne Smith","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0","os":"Windows 10","browser":"CHROMIUM_EDGE"},"zone":"null","device":"Computer","id":null,"ipAddress":"150.209.140.32","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idx8sPKagQnRveQsM6hratk-g"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-12-28T20:25:39.978Z","securityContext":{"asNumber":22773,"asOrg":"cox communications","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"9337faeefdbe15a87a129ce09ee8c01c","deviceFingerprint":"4983dc04f7ca56f1a2f8785ba2961804","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.13.1","requestId":"e21d871e03ff3728993ac22fa2b53c20","dtHash":"00dad46046a998611b66c7870e43e80b9b9c339e601be7715def0769c7420610","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"e21d871e03ff3728993ac22fa2b53c20","detail":{}},"uuid":"44639f1c-a5bf-11ee-a466-43b26a813526","version":"0","request":{"ipChain":[{"ip":"150.209.140.32","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}},"version":"V4","source":null}]},"target":[{"id":"laept6o4gq58bWnXP696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa2kbwyr3wK2PkBt697","type":"AppInstance","alternateId":"Microsoft 365 Portal","displayName":"Microsoft 365 Portal","detailEntry":null}]}} ::: program=CHROMIUM_EDGE ::: clientIP=150.209.140.32 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-12-28T20:25:39.978Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=User login to Okta\",\"userDisplay=Adrienne Smith | PBC - SBA\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u5mbsczwH21Ko9j697\",\"status\":\"ACTIVE\",\"created\":\"2023-05-25T18:28:15.000Z\",\"activated\":\"2023-05-25T18:28:17.000Z\",\"statusChanged\":\"2023-09-27T15:14:21.000Z\",\"lastLogin\":\"2023-12-28T20:26:08.000Z\",\"lastUpdated\":\"2023-09-27T15:14:21.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"Adrienne\",\"lastName\":\"Smith\",\"primaryPhone\":\"(760) 759-1740\",\"immutableID\":\"9VJ0uASRo0G4SDz/Hil6sA==\",\"mobilePhone\":null,\"displayName\":\"Adrienne Smith\",\"countryCode\":\"US\",\"secondEmail\":null,\"title\":\"Sr. SBA Loan Administrator\",\"department\":\"PBC - SBA\",\"login\":\"nighthawk\",\"email\":\"nighthawk\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697\"},\"resetFactors\":{\"href\":\"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u5mbsczwH21Ko9j697\",\"type\":\"User\",\"alternateId\":\"nighthawk\",\"displayName\":\"Adrienne Smith\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0\",\"os\":\"Windows 10\",\"browser\":\"CHROMIUM_EDGE\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":null,\"ipAddress\":\"150.209.140.32\",\"geographicalContext\":{\"city\":\"Chula Vista\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"91911\",\"geolocation\":{\"lat\":32.6065,\"lon\":-117.058}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idx8sPKagQnRveQsM6hratk-g\"},\"displayMessage\":\"User login to Okta\",\"eventType\":\"user.session.start\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"INVALID_CREDENTIALS\"},\"published\":\"2023-12-28T20:25:39.978Z\",\"securityContext\":{\"asNumber\":22773,\"asOrg\":\"cox communications\",\"isp\":\"cox communications inc.\",\"domain\":\"cox.net\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"9337faeefdbe15a87a129ce09ee8c01c\",\"deviceFingerprint\":\"4983dc04f7ca56f1a2f8785ba2961804\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.13.1\",\"requestId\":\"e21d871e03ff3728993ac22fa2b53c20\",\"dtHash\":\"00dad46046a998611b66c7870e43e80b9b9c339e601be7715def0769c7420610\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\",\"logOnlySecurityData\":\"{\\\"risk\\\":{\\\"level\\\":\\\"LOW\\\"},\\\"behaviors\\\":{\\\"New Geo-Location\\\":\\\"NEGATIVE\\\",\\\"New Device\\\":\\\"NEGATIVE\\\",\\\"New IP\\\":\\\"NEGATIVE\\\",\\\"New State\\\":\\\"NEGATIVE\\\",\\\"New Country\\\":\\\"NEGATIVE\\\",\\\"Velocity\\\":\\\"NEGATIVE\\\",\\\"New City\\\":\\\"NEGATIVE\\\"}}\"}},\"legacyEventType\":\"core.user_auth.login_failed\",\"transaction\":{\"type\":\"WEB\",\"id\":\"e21d871e03ff3728993ac22fa2b53c20\",\"detail\":{}},\"uuid\":\"44639f1c-a5bf-11ee-a466-43b26a813526\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"150.209.140.32\",\"geographicalContext\":{\"city\":\"Chula Vista\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"91911\",\"geolocation\":{\"lat\":32.6065,\"lon\":-117.058}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"laept6o4gq58bWnXP696\",\"type\":\"AuthenticatorEnrollment\",\"alternateId\":\"unknown\",\"displayName\":\"Password\",\"detailEntry\":null},{\"id\":\"0oa2kbwyr3wK2PkBt697\",\"type\":\"AppInstance\",\"alternateId\":\"Microsoft 365 Portal\",\"displayName\":\"Microsoft 365 Portal\",\"detailEntry\":null}]}} ::: program=CHROMIUM_EDGE ::: clientIP=150.209.140.32 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-12-28T20:25:39.978Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "CHROMIUM_EDGE",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 3,
"severitylabel": "error",
"sourceinfo": "unknown",
"tags": [
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"description=User login to Okta",
"userDisplay=Adrienne Smith | PBC - SBA",
"auth_failure"
],
"vendorcode": "user.session.start",
"streamName": "Okta",
"clientIP": "150.209.140.32",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Adrienne Smith | PBC - SBA","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u5mbsczwH21Ko9j697","status":"ACTIVE","created":"2023-05-25T18:28:15.000Z","activated":"2023-05-25T18:28:17.000Z","statusChanged":"2023-09-27T15:14:21.000Z","lastLogin":"2023-12-28T20:26:08.000Z","lastUpdated":"2023-09-27T15:14:21.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Adrienne","lastName":"Smith","primaryPhone":"(760) 759-1740","immutableID":"9VJ0uASRo0G4SDz/Hil6sA==","mobilePhone":null,"displayName":"Adrienne Smith","countryCode":"US","secondEmail":null,"title":"Sr. SBA Loan Administrator","department":"PBC - SBA","login":"nighthawk","email":"nighthawk"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u5mbsczwH21Ko9j697","type":"User","alternateId":"nighthawk","displayName":"Adrienne Smith","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0","os":"Windows 10","browser":"CHROMIUM_EDGE"},"zone":"null","device":"Computer","id":null,"ipAddress":"150.209.140.32","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idx8sPKagQnRveQsM6hratk-g"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-12-28T20:25:39.978Z","securityContext":{"asNumber":22773,"asOrg":"cox communications","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"9337faeefdbe15a87a129ce09ee8c01c","deviceFingerprint":"4983dc04f7ca56f1a2f8785ba2961804","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.13.1","requestId":"e21d871e03ff3728993ac22fa2b53c20","dtHash":"00dad46046a998611b66c7870e43e80b9b9c339e601be7715def0769c7420610","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"e21d871e03ff3728993ac22fa2b53c20","detail":{}},"uuid":"44639f1c-a5bf-11ee-a466-43b26a813526","version":"0","request":{"ipChain":[{"ip":"150.209.140.32","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}},"version":"V4","source":null}]},"target":[{"id":"laept6o4gq58bWnXP696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa2kbwyr3wK2PkBt697","type":"AppInstance","alternateId":"Microsoft 365 Portal","displayName":"Microsoft 365 Portal","detailEntry":null}]}} ::: program=CHROMIUM_EDGE ::: clientIP=150.209.140.32 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-12-28T20:25:39.978Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Adrienne Smith | PBC - SBA","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u5mbsczwH21Ko9j697","status":"ACTIVE","created":"2023-05-25T18:28:15.000Z","activated":"2023-05-25T18:28:17.000Z","statusChanged":"2023-09-27T15:14:21.000Z","lastLogin":"2023-12-28T20:26:08.000Z","lastUpdated":"2023-09-27T15:14:21.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Adrienne","lastName":"Smith","primaryPhone":"(760) 759-1740","immutableID":"9VJ0uASRo0G4SDz/Hil6sA==","mobilePhone":null,"displayName":"Adrienne Smith","countryCode":"US","secondEmail":null,"title":"Sr. SBA Loan Administrator","department":"PBC - SBA","login":"nighthawk","email":"nighthawk"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u5mbsczwH21Ko9j697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u5mbsczwH21Ko9j697","type":"User","alternateId":"nighthawk","displayName":"Adrienne Smith","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0","os":"Windows 10","browser":"CHROMIUM_EDGE"},"zone":"null","device":"Computer","id":null,"ipAddress":"150.209.140.32","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idx8sPKagQnRveQsM6hratk-g"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-12-28T20:25:39.978Z","securityContext":{"asNumber":22773,"asOrg":"cox communications","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"9337faeefdbe15a87a129ce09ee8c01c","deviceFingerprint":"4983dc04f7ca56f1a2f8785ba2961804","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.13.1","requestId":"e21d871e03ff3728993ac22fa2b53c20","dtHash":"00dad46046a998611b66c7870e43e80b9b9c339e601be7715def0769c7420610","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"e21d871e03ff3728993ac22fa2b53c20","detail":{}},"uuid":"44639f1c-a5bf-11ee-a466-43b26a813526","version":"0","request":{"ipChain":[{"ip":"150.209.140.32","geographicalContext":{"city":"Chula Vista","state":"California","country":"United States","postalCode":"91911","geolocation":{"lat":32.6065,"lon":-117.058}},"version":"V4","source":null}]},"target":[{"id":"laept6o4gq58bWnXP696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa2kbwyr3wK2PkBt697","type":"AppInstance","alternateId":"Microsoft 365 Portal","displayName":"Microsoft 365 Portal","detailEntry":null}]}} ::: program=CHROMIUM_EDGE ::: clientIP=150.209.140.32 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-12-28T20:25:39.978Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: CHROMIUM_EDGE
senderhost: kafka.precinct
sensitivity: normal
severitycode: 3
severitylabel: error
sourceinfo: unknown
tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=User login to Okta', 'userDisplay=Adrienne Smith | PBC - SBA', 'auth_failure']
vendorcode: user.session.start
streamName: Okta
clientIP: 150.209.140.32
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"45.175.131.107","externalIp":"30.69.243.36","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:26.000Z"} ::: clientIP=45.175.131.107 ::: serverIP=30.69.243.36 ::: userName=bob ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "find-prizes.life",
"message": "WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={\"originId\":606655908,\"originType\":\"Network Devices\",\"internalIp\":\"45.175.131.107\",\"externalIp\":\"30.69.243.36\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"find-prizes.life\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-24T15:25:26.000Z\"} ::: clientIP=45.175.131.107 ::: serverIP=30.69.243.36 ::: userName=bob ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "find-prizes.life",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-24T15:25:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareNot Actionable",
"streamName": "OpenDNS Detection",
"clientIP": "45.175.131.107",
"serverIP": "30.69.243.36",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"45.175.131.107","externalIp":"30.69.243.36","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:26.000Z"} ::: clientIP=45.175.131.107 ::: serverIP=30.69.243.36 ::: userName=bob ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"45.175.131.107","externalIp":"30.69.243.36","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:26.000Z"} ::: clientIP=45.175.131.107 ::: serverIP=30.69.243.36 ::: userName=bob ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: find-prizes.life
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: find-prizes.life
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-24T15:25:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareNot Actionable
streamName: OpenDNS Detection
clientIP: 45.175.131.107
serverIP: 30.69.243.36
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"58.222.164.199","externalIp":"200.83.55.232","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:26.000Z"} ::: clientIP=58.222.164.199 ::: serverIP=200.83.55.232 ::: userName=janedoe ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "find-prizes.life",
"message": "WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={\"originId\":606655908,\"originType\":\"Network Devices\",\"internalIp\":\"58.222.164.199\",\"externalIp\":\"200.83.55.232\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"find-prizes.life\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-24T15:25:26.000Z\"} ::: clientIP=58.222.164.199 ::: serverIP=200.83.55.232 ::: userName=janedoe ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "find-prizes.life",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-24T15:25:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareNot Actionable",
"streamName": "OpenDNS Detection",
"clientIP": "58.222.164.199",
"serverIP": "200.83.55.232",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"58.222.164.199","externalIp":"200.83.55.232","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:26.000Z"} ::: clientIP=58.222.164.199 ::: serverIP=200.83.55.232 ::: userName=janedoe ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"58.222.164.199","externalIp":"200.83.55.232","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:26.000Z"} ::: clientIP=58.222.164.199 ::: serverIP=200.83.55.232 ::: userName=janedoe ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: find-prizes.life
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: find-prizes.life
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-24T15:25:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareNot Actionable
streamName: OpenDNS Detection
clientIP: 58.222.164.199
serverIP: 200.83.55.232
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"127.167.36.64","externalIp":"59.59.123.103","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:26.000Z"} ::: clientIP=127.167.36.64 ::: serverIP=59.59.123.103 ::: userName=fish ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "find-prizes.life",
"message": "WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={\"originId\":606655908,\"originType\":\"Network Devices\",\"internalIp\":\"127.167.36.64\",\"externalIp\":\"59.59.123.103\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"find-prizes.life\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-24T15:25:26.000Z\"} ::: clientIP=127.167.36.64 ::: serverIP=59.59.123.103 ::: userName=fish ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "find-prizes.life",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-24T15:25:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareNot Actionable",
"streamName": "OpenDNS Detection",
"clientIP": "127.167.36.64",
"serverIP": "59.59.123.103",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"127.167.36.64","externalIp":"59.59.123.103","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:26.000Z"} ::: clientIP=127.167.36.64 ::: serverIP=59.59.123.103 ::: userName=fish ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"127.167.36.64","externalIp":"59.59.123.103","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:26.000Z"} ::: clientIP=127.167.36.64 ::: serverIP=59.59.123.103 ::: userName=fish ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: find-prizes.life
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: find-prizes.life
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-24T15:25:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareNot Actionable
streamName: OpenDNS Detection
clientIP: 127.167.36.64
serverIP: 59.59.123.103
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"243.16.97.157","externalIp":"28.125.253.78","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:26.000Z"} ::: clientIP=243.16.97.157 ::: serverIP=28.125.253.78 ::: userName=janedoe ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "find-prizes.life",
"message": "WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={\"originId\":606655908,\"originType\":\"Network Devices\",\"internalIp\":\"243.16.97.157\",\"externalIp\":\"28.125.253.78\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"find-prizes.life\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-24T15:25:26.000Z\"} ::: clientIP=243.16.97.157 ::: serverIP=28.125.253.78 ::: userName=janedoe ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "find-prizes.life",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-24T15:25:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareNot Actionable",
"streamName": "OpenDNS Detection",
"clientIP": "243.16.97.157",
"serverIP": "28.125.253.78",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"243.16.97.157","externalIp":"28.125.253.78","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:26.000Z"} ::: clientIP=243.16.97.157 ::: serverIP=28.125.253.78 ::: userName=janedoe ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"243.16.97.157","externalIp":"28.125.253.78","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:26.000Z"} ::: clientIP=243.16.97.157 ::: serverIP=28.125.253.78 ::: userName=janedoe ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: find-prizes.life
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: find-prizes.life
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-24T15:25:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareNot Actionable
streamName: OpenDNS Detection
clientIP: 243.16.97.157
serverIP: 28.125.253.78
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"216.240.6.165","externalIp":"11.143.73.146","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-25T09:41:41.000Z"} ::: clientIP=216.240.6.165 ::: serverIP=11.143.73.146 ::: userName=nighthawk ::: created_at=2023-05-25T09:41:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T09:41:41.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "find-prizes.life",
"message": "WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"216.240.6.165\",\"externalIp\":\"11.143.73.146\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"find-prizes.life\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T09:41:41.000Z\"} ::: clientIP=216.240.6.165 ::: serverIP=11.143.73.146 ::: userName=nighthawk ::: created_at=2023-05-25T09:41:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T09:41:41.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "find-prizes.life",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-25T09:41:41.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareNot Actionable",
"streamName": "OpenDNS Detection",
"clientIP": "216.240.6.165",
"serverIP": "11.143.73.146",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"216.240.6.165","externalIp":"11.143.73.146","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-25T09:41:41.000Z"} ::: clientIP=216.240.6.165 ::: serverIP=11.143.73.146 ::: userName=nighthawk ::: created_at=2023-05-25T09:41:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T09:41:41.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"216.240.6.165","externalIp":"11.143.73.146","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-25T09:41:41.000Z"} ::: clientIP=216.240.6.165 ::: serverIP=11.143.73.146 ::: userName=nighthawk ::: created_at=2023-05-25T09:41:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T09:41:41.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: find-prizes.life
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: find-prizes.life
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-25T09:41:41.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareNot Actionable
streamName: OpenDNS Detection
clientIP: 216.240.6.165
serverIP: 11.143.73.146
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"236.166.9.51","externalIp":"116.48.8.10","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-25T09:41:41.000Z"} ::: clientIP=236.166.9.51 ::: serverIP=116.48.8.10 ::: userName=janedoe ::: created_at=2023-05-25T09:41:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T09:41:41.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "find-prizes.life",
"message": "WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"236.166.9.51\",\"externalIp\":\"116.48.8.10\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"find-prizes.life\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T09:41:41.000Z\"} ::: clientIP=236.166.9.51 ::: serverIP=116.48.8.10 ::: userName=janedoe ::: created_at=2023-05-25T09:41:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T09:41:41.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "find-prizes.life",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-25T09:41:41.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareNot Actionable",
"streamName": "OpenDNS Detection",
"clientIP": "236.166.9.51",
"serverIP": "116.48.8.10",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"236.166.9.51","externalIp":"116.48.8.10","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-25T09:41:41.000Z"} ::: clientIP=236.166.9.51 ::: serverIP=116.48.8.10 ::: userName=janedoe ::: created_at=2023-05-25T09:41:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T09:41:41.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"236.166.9.51","externalIp":"116.48.8.10","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-25T09:41:41.000Z"} ::: clientIP=236.166.9.51 ::: serverIP=116.48.8.10 ::: userName=janedoe ::: created_at=2023-05-25T09:41:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T09:41:41.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: find-prizes.life
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: find-prizes.life
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-25T09:41:41.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareNot Actionable
streamName: OpenDNS Detection
clientIP: 236.166.9.51
serverIP: 116.48.8.10
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=glocke5.de ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"123.179.12.166","externalIp":"56.217.129.25","categories":["Malware","Not Actionable"],"tags":[],"destination":"glocke5.de","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-07T18:46:27.000Z"} ::: clientIP=123.179.12.166 ::: serverIP=56.217.129.25 ::: userName=bob ::: created_at=2023-05-07T18:46:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-07T18:46:27.000Z ::: serverHostname=glocke5.de ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "glocke5.de",
"message": "WitFoo-Artifact ::: fqdn=glocke5.de ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"123.179.12.166\",\"externalIp\":\"56.217.129.25\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"glocke5.de\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-07T18:46:27.000Z\"} ::: clientIP=123.179.12.166 ::: serverIP=56.217.129.25 ::: userName=bob ::: created_at=2023-05-07T18:46:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-07T18:46:27.000Z ::: serverHostname=glocke5.de ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "glocke5.de",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-07T18:46:27.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareNot Actionable",
"streamName": "OpenDNS Detection",
"clientIP": "123.179.12.166",
"serverIP": "56.217.129.25",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=glocke5.de ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"123.179.12.166","externalIp":"56.217.129.25","categories":["Malware","Not Actionable"],"tags":[],"destination":"glocke5.de","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-07T18:46:27.000Z"} ::: clientIP=123.179.12.166 ::: serverIP=56.217.129.25 ::: userName=bob ::: created_at=2023-05-07T18:46:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-07T18:46:27.000Z ::: serverHostname=glocke5.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=glocke5.de ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"123.179.12.166","externalIp":"56.217.129.25","categories":["Malware","Not Actionable"],"tags":[],"destination":"glocke5.de","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-07T18:46:27.000Z"} ::: clientIP=123.179.12.166 ::: serverIP=56.217.129.25 ::: userName=bob ::: created_at=2023-05-07T18:46:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-07T18:46:27.000Z ::: serverHostname=glocke5.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: glocke5.de
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: glocke5.de
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-07T18:46:27.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareNot Actionable
streamName: OpenDNS Detection
clientIP: 123.179.12.166
serverIP: 56.217.129.25
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=glocke5.de ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"114.15.84.71","externalIp":"221.32.8.93","categories":["Malware","Not Actionable"],"tags":[],"destination":"glocke5.de","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-07T18:46:27.000Z"} ::: clientIP=114.15.84.71 ::: serverIP=221.32.8.93 ::: userName=bob ::: created_at=2023-05-07T18:46:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-07T18:46:27.000Z ::: serverHostname=glocke5.de ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "glocke5.de",
"message": "WitFoo-Artifact ::: fqdn=glocke5.de ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"114.15.84.71\",\"externalIp\":\"221.32.8.93\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"glocke5.de\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-07T18:46:27.000Z\"} ::: clientIP=114.15.84.71 ::: serverIP=221.32.8.93 ::: userName=bob ::: created_at=2023-05-07T18:46:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-07T18:46:27.000Z ::: serverHostname=glocke5.de ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "glocke5.de",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-07T18:46:27.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareNot Actionable",
"streamName": "OpenDNS Detection",
"clientIP": "114.15.84.71",
"serverIP": "221.32.8.93",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=glocke5.de ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"114.15.84.71","externalIp":"221.32.8.93","categories":["Malware","Not Actionable"],"tags":[],"destination":"glocke5.de","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-07T18:46:27.000Z"} ::: clientIP=114.15.84.71 ::: serverIP=221.32.8.93 ::: userName=bob ::: created_at=2023-05-07T18:46:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-07T18:46:27.000Z ::: serverHostname=glocke5.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=glocke5.de ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"114.15.84.71","externalIp":"221.32.8.93","categories":["Malware","Not Actionable"],"tags":[],"destination":"glocke5.de","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-07T18:46:27.000Z"} ::: clientIP=114.15.84.71 ::: serverIP=221.32.8.93 ::: userName=bob ::: created_at=2023-05-07T18:46:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-07T18:46:27.000Z ::: serverHostname=glocke5.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: glocke5.de
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: glocke5.de
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-07T18:46:27.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareNot Actionable
streamName: OpenDNS Detection
clientIP: 114.15.84.71
serverIP: 221.32.8.93
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"196.39.122.31","externalIp":"164.39.245.189","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:26.000Z"} ::: clientIP=196.39.122.31 ::: serverIP=164.39.245.189 ::: userName=alice ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "find-prizes.life",
"message": "WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={\"originId\":606655908,\"originType\":\"Network Devices\",\"internalIp\":\"196.39.122.31\",\"externalIp\":\"164.39.245.189\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"find-prizes.life\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-24T15:25:26.000Z\"} ::: clientIP=196.39.122.31 ::: serverIP=164.39.245.189 ::: userName=alice ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "find-prizes.life",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-24T15:25:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareNot Actionable",
"streamName": "OpenDNS Detection",
"clientIP": "196.39.122.31",
"serverIP": "164.39.245.189",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"196.39.122.31","externalIp":"164.39.245.189","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:26.000Z"} ::: clientIP=196.39.122.31 ::: serverIP=164.39.245.189 ::: userName=alice ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"196.39.122.31","externalIp":"164.39.245.189","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:26.000Z"} ::: clientIP=196.39.122.31 ::: serverIP=164.39.245.189 ::: userName=alice ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: find-prizes.life
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: find-prizes.life
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-24T15:25:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareNot Actionable
streamName: OpenDNS Detection
clientIP: 196.39.122.31
serverIP: 164.39.245.189
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"82.119.24.27","externalIp":"116.9.54.0","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:26.000Z"} ::: clientIP=82.119.24.27 ::: serverIP=116.9.54.0 ::: userName=johndoe ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "find-prizes.life",
"message": "WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={\"originId\":606655908,\"originType\":\"Network Devices\",\"internalIp\":\"82.119.24.27\",\"externalIp\":\"116.9.54.0\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"find-prizes.life\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-24T15:25:26.000Z\"} ::: clientIP=82.119.24.27 ::: serverIP=116.9.54.0 ::: userName=johndoe ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "find-prizes.life",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-24T15:25:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareNot Actionable",
"streamName": "OpenDNS Detection",
"clientIP": "82.119.24.27",
"serverIP": "116.9.54.0",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"82.119.24.27","externalIp":"116.9.54.0","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:26.000Z"} ::: clientIP=82.119.24.27 ::: serverIP=116.9.54.0 ::: userName=johndoe ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"82.119.24.27","externalIp":"116.9.54.0","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:26.000Z"} ::: clientIP=82.119.24.27 ::: serverIP=116.9.54.0 ::: userName=johndoe ::: created_at=2023-05-24T15:25:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:26.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: find-prizes.life
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: find-prizes.life
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-24T15:25:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareNot Actionable
streamName: OpenDNS Detection
clientIP: 82.119.24.27
serverIP: 116.9.54.0
userName: johndoe | Explain this syslog message |
<134>Sep 29 01:57:45 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=189.102.165.8 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:ED:6C:18:BC:1F TrendMicroDsFrameType=IP src=253.163.105.151 dst=189.102.165.8 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1572 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=129 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 443,
"severitylabel": "critical",
"tags": [
"TCP Flags:ACK PSH",
"trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels",
"DPI Note:HTTPTraffic",
"Detected HTTP Traffic Over Secured HTTPS Channels",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"trend micro_deep security agent",
"DPI Stream Position :0"
],
"productids": [
30
],
"severitycode": 2,
"sourceinfo": "unknown",
"message": "<134>Sep 29 01:57:45 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=189.102.165.8 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:ED:6C:18:BC:1F TrendMicroDsFrameType=IP src=253.163.105.151 dst=189.102.165.8 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1572 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=129 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"HTTPTraffic\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Sep 29 01:57:45",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Detected HTTP Traffic Over Secured HTTPS Channels",
"servermac": "0ABBAEEE7AE1",
"clientmac": "0AED6C18BC1F",
"clientport": 1572,
"vendorcode": "1003305",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "253.163.105.151",
"serverIP": "189.102.165.8"
} | Create a JSON artifact from the message |
<134>Sep 29 01:57:45 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=189.102.165.8 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:ED:6C:18:BC:1F TrendMicroDsFrameType=IP src=253.163.105.151 dst=189.102.165.8 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1572 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=129 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Sep 29 01:57:45 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=189.102.165.8 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:ED:6C:18:BC:1F TrendMicroDsFrameType=IP src=253.163.105.151 dst=189.102.165.8 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1572 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=129 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 443
severitylabel: critical
tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels', 'DPI Note:HTTPTraffic', 'Detected HTTP Traffic Over Secured HTTPS Channels', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position :0']
productids: [30]
severitycode: 2
sourceinfo: unknown
localstarttime: Sep 29 01:57:45
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Detected HTTP Traffic Over Secured HTTPS Channels
servermac: 0ABBAEEE7AE1
clientmac: 0AED6C18BC1F
clientport: 1572
vendorcode: 1003305
action: IDS:Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 253.163.105.151
serverIP: 189.102.165.8 | Explain this syslog message |
<134>Sep 29 01:56:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=35.25.204.174 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:37:7C:7D:F5:29 TrendMicroDsFrameType=IP src=119.163.16.1 dst=35.25.204.174 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=58748 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=3 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 443,
"severitylabel": "emergency",
"tags": [
"TCP Flags:ACK PSH",
"DPI Note:CVE-2010-2730",
"trend micro_deep security agent_Request Header Buffer Overflow Vulnerability",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"Request Header Buffer Overflow Vulnerability",
"trend micro_deep security agent",
"DPI Stream Position :0"
],
"productids": [
30
],
"sourceinfo": "unknown",
"message": "<134>Sep 29 01:56:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=35.25.204.174 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:37:7C:7D:F5:29 TrendMicroDsFrameType=IP src=119.163.16.1 dst=35.25.204.174 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=58748 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=3 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2010-2730\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Sep 29 01:56:55",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Request Header Buffer Overflow Vulnerability",
"servermac": "0ABBAEEE7AE1",
"clientmac": "0A377C7DF529",
"clientport": 58748,
"vendorcode": "1004398",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "119.163.16.1",
"serverIP": "35.25.204.174"
} | Create a JSON artifact from the message |
<134>Sep 29 01:56:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=35.25.204.174 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:37:7C:7D:F5:29 TrendMicroDsFrameType=IP src=119.163.16.1 dst=35.25.204.174 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=58748 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=3 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Sep 29 01:56:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=35.25.204.174 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:37:7C:7D:F5:29 TrendMicroDsFrameType=IP src=119.163.16.1 dst=35.25.204.174 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=58748 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=3 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 443
severitylabel: emergency
tags: ['TCP Flags:ACK PSH', 'DPI Note:CVE-2010-2730', 'trend micro_deep security agent_Request Header Buffer Overflow Vulnerability', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'Request Header Buffer Overflow Vulnerability', 'trend micro_deep security agent', 'DPI Stream Position :0']
productids: [30]
sourceinfo: unknown
localstarttime: Sep 29 01:56:55
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Request Header Buffer Overflow Vulnerability
servermac: 0ABBAEEE7AE1
clientmac: 0A377C7DF529
clientport: 58748
vendorcode: 1004398
action: IDS:Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 119.163.16.1
serverIP: 35.25.204.174 | Explain this syslog message |
<134>Sep 29 01:56:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=93.243.213.68 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:37:7C:7D:F5:29 TrendMicroDsFrameType=IP src=247.186.66.169 dst=93.243.213.68 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=58748 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 443,
"severitylabel": "emergency",
"tags": [
"TCP Flags:ACK PSH",
"trend micro_deep security agent_Request Header Buffer Overflow Vulnerability",
"DPI Note:CVE-2010-2730-1",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"Request Header Buffer Overflow Vulnerability",
"trend micro_deep security agent",
"DPI Stream Position :0"
],
"productids": [
30
],
"sourceinfo": "unknown",
"message": "<134>Sep 29 01:56:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=93.243.213.68 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:37:7C:7D:F5:29 TrendMicroDsFrameType=IP src=247.186.66.169 dst=93.243.213.68 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=58748 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2010-2730-1\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Sep 29 01:56:55",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Request Header Buffer Overflow Vulnerability",
"servermac": "0ABBAEEE7AE1",
"clientmac": "0A377C7DF529",
"clientport": 58748,
"vendorcode": "1004398",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "247.186.66.169",
"serverIP": "93.243.213.68"
} | Create a JSON artifact from the message |
<134>Sep 29 01:56:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=93.243.213.68 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:37:7C:7D:F5:29 TrendMicroDsFrameType=IP src=247.186.66.169 dst=93.243.213.68 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=58748 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Sep 29 01:56:55 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1004398|Request Header Buffer Overflow Vulnerability|10|cn1=36465 cn1Label=Host ID dvc=93.243.213.68 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:37:7C:7D:F5:29 TrendMicroDsFrameType=IP src=247.186.66.169 dst=93.243.213.68 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=58748 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2010-2730-1" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 443
severitylabel: emergency
tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Request Header Buffer Overflow Vulnerability', 'DPI Note:CVE-2010-2730-1', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'Request Header Buffer Overflow Vulnerability', 'trend micro_deep security agent', 'DPI Stream Position :0']
productids: [30]
sourceinfo: unknown
localstarttime: Sep 29 01:56:55
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Request Header Buffer Overflow Vulnerability
servermac: 0ABBAEEE7AE1
clientmac: 0A377C7DF529
clientport: 58748
vendorcode: 1004398
action: IDS:Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 247.186.66.169
serverIP: 93.243.213.68 | Explain this syslog message |
<134>Sep 29 01:57:45 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=35.75.207.134 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:ED:6C:18:BC:1F TrendMicroDsFrameType=IP src=210.232.246.15 dst=35.75.207.134 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1572 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=129 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 443,
"severitylabel": "critical",
"tags": [
"TCP Flags:ACK PSH",
"trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels",
"DPI Note:HTTPTraffic",
"Detected HTTP Traffic Over Secured HTTPS Channels",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"trend micro_deep security agent",
"DPI Stream Position :0"
],
"productids": [
30
],
"severitycode": 2,
"sourceinfo": "unknown",
"message": "<134>Sep 29 01:57:45 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=35.75.207.134 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:ED:6C:18:BC:1F TrendMicroDsFrameType=IP src=210.232.246.15 dst=35.75.207.134 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1572 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=129 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"HTTPTraffic\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Sep 29 01:57:45",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Detected HTTP Traffic Over Secured HTTPS Channels",
"servermac": "0ABBAEEE7AE1",
"clientmac": "0AED6C18BC1F",
"clientport": 1572,
"vendorcode": "1003305",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "210.232.246.15",
"serverIP": "35.75.207.134"
} | Create a JSON artifact from the message |
<134>Sep 29 01:57:45 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=35.75.207.134 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:ED:6C:18:BC:1F TrendMicroDsFrameType=IP src=210.232.246.15 dst=35.75.207.134 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1572 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=129 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Sep 29 01:57:45 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=35.75.207.134 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:ED:6C:18:BC:1F TrendMicroDsFrameType=IP src=210.232.246.15 dst=35.75.207.134 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1572 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=129 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 443
severitylabel: critical
tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels', 'DPI Note:HTTPTraffic', 'Detected HTTP Traffic Over Secured HTTPS Channels', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position :0']
productids: [30]
severitycode: 2
sourceinfo: unknown
localstarttime: Sep 29 01:57:45
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Detected HTTP Traffic Over Secured HTTPS Channels
servermac: 0ABBAEEE7AE1
clientmac: 0AED6C18BC1F
clientport: 1572
vendorcode: 1003305
action: IDS:Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 210.232.246.15
serverIP: 35.75.207.134 | Explain this syslog message |
<134>Sep 29 01:52:19 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=197.59.246.103 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:37:7C:7D:F5:29 TrendMicroDsFrameType=IP src=10.84.211.66 dst=197.59.246.103 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1670 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=149 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 443,
"severitylabel": "critical",
"tags": [
"TCP Flags:ACK PSH",
"trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels",
"DPI Note:HTTPTraffic",
"Detected HTTP Traffic Over Secured HTTPS Channels",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"trend micro_deep security agent",
"DPI Stream Position :0"
],
"productids": [
30
],
"severitycode": 2,
"sourceinfo": "unknown",
"message": "<134>Sep 29 01:52:19 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=197.59.246.103 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:37:7C:7D:F5:29 TrendMicroDsFrameType=IP src=10.84.211.66 dst=197.59.246.103 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1670 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=149 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"HTTPTraffic\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Sep 29 01:52:19",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Detected HTTP Traffic Over Secured HTTPS Channels",
"servermac": "0ABBAEEE7AE1",
"clientmac": "0A377C7DF529",
"clientport": 1670,
"vendorcode": "1003305",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "10.84.211.66",
"serverIP": "197.59.246.103"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.