input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"102.221.122.158","externalIp":"78.111.149.83","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=102.221.122.158 ::: serverIP=78.111.149.83 ::: userName=fish ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"102.221.122.158","externalIp":"78.111.149.83","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=102.221.122.158 ::: serverIP=78.111.149.83 ::: userName=fish ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-09T19:51:35.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: compete4.buzz messagetype: firewall_action severitycode: 2 fqdn: compete4.buzz vendorcode: PhishingNot Actionable action: block streamName: OpenDNS Detection clientIP: 102.221.122.158 serverIP: 78.111.149.83 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"213.30.72.190","externalIp":"229.230.41.218","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=213.30.72.190 ::: serverIP=229.230.41.218 ::: userName=bob ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-09T19:51:35.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"213.30.72.190\",\"externalIp\":\"229.230.41.218\",\"categories\":[\"Phishing\",\"Not Actionable\"],\"tags\":[],\"destination\":\"compete4.buzz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-09T19:51:35.000Z\"} ::: clientIP=213.30.72.190 ::: serverIP=229.230.41.218 ::: userName=bob ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "compete4.buzz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "compete4.buzz", "vendorcode": "PhishingNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "213.30.72.190", "serverIP": "229.230.41.218", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"213.30.72.190","externalIp":"229.230.41.218","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=213.30.72.190 ::: serverIP=229.230.41.218 ::: userName=bob ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"213.30.72.190","externalIp":"229.230.41.218","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=213.30.72.190 ::: serverIP=229.230.41.218 ::: userName=bob ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-09T19:51:35.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: compete4.buzz messagetype: firewall_action severitycode: 2 fqdn: compete4.buzz vendorcode: PhishingNot Actionable action: block streamName: OpenDNS Detection clientIP: 213.30.72.190 serverIP: 229.230.41.218 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"250.12.216.155","externalIp":"127.226.245.127","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=250.12.216.155 ::: serverIP=127.226.245.127 ::: userName=johndoe ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-09T19:51:35.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"250.12.216.155\",\"externalIp\":\"127.226.245.127\",\"categories\":[\"Phishing\",\"Not Actionable\"],\"tags\":[],\"destination\":\"compete4.buzz\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-09T19:51:35.000Z\"} ::: clientIP=250.12.216.155 ::: serverIP=127.226.245.127 ::: userName=johndoe ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "compete4.buzz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "compete4.buzz", "vendorcode": "PhishingNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "250.12.216.155", "serverIP": "127.226.245.127", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"250.12.216.155","externalIp":"127.226.245.127","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=250.12.216.155 ::: serverIP=127.226.245.127 ::: userName=johndoe ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"250.12.216.155","externalIp":"127.226.245.127","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=250.12.216.155 ::: serverIP=127.226.245.127 ::: userName=johndoe ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-09T19:51:35.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: compete4.buzz messagetype: firewall_action severitycode: 2 fqdn: compete4.buzz vendorcode: PhishingNot Actionable action: block streamName: OpenDNS Detection clientIP: 250.12.216.155 serverIP: 127.226.245.127 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tWAYNE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\twayne.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t68.98.253.108\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"xapp2.wayne.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.wayne.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"68.98.253.108","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"WAYNE","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"wayne.org","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}}
{ "action": "Logon", "clientport": 56518, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-03T13:13:57.972Z\",\"agent\":{\"ephemeral_id\":\"b984cc9c-1997-44b4-bc3c-b7c53627b596\",\"id\":\"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6\",\"name\":\"xapp2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-03T13:13:59.640Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"xapp2.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tXAPP2$\\n\\tAccount Domain:\\t\\tWAYNE\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t10\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\twayne.org\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0xc4c\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\svchost.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tXAPP2\\n\\tSource Network Address:\\t68.98.253.108\\n\\tSource Port:\\t\\t56518\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tUser32 \\n\\tAuthentication Package:\\tNegotiate\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"xapp2.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{20df3bf1-47ce-4359-a9db-b09eacb45401}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"xapp2.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"Negotiate\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"68.98.253.108\",\"IpPort\":\"56518\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"User32 \",\"LogonType\":\"10\",\"ProcessId\":\"0xc4c\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\svchost.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"WAYNE\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"XAPP2$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"wayne.org\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"XAPP2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":1516,\"thread\":{\"id\":3952}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7937355,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "xapp2.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "7937355", "streamName": "microsoft-windows-security-auditing", "clientIP": "68.98.253.108", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tWAYNE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\twayne.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t68.98.253.108\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"xapp2.wayne.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.wayne.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"68.98.253.108","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"WAYNE","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"wayne.org","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tWAYNE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\twayne.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t68.98.253.108\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"xapp2.wayne.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.wayne.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"68.98.253.108","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"WAYNE","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"wayne.org","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 56518 messagetype: auth_failure productids: [6] senderhost: xapp2.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 7937355 streamName: microsoft-windows-security-auditing clientIP: 68.98.253.108 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tOSCORP\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\toscorp.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t60.228.161.56\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"xapp2.oscorp.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.oscorp.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"60.228.161.56","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"OSCORP","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"oscorp.org","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}}
{ "action": "Logon", "clientport": 56518, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-03T13:13:57.972Z\",\"agent\":{\"ephemeral_id\":\"b984cc9c-1997-44b4-bc3c-b7c53627b596\",\"id\":\"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6\",\"name\":\"xapp2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-03T13:13:59.640Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"xapp2.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tXAPP2$\\n\\tAccount Domain:\\t\\tOSCORP\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t10\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\toscorp.org\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0xc4c\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\svchost.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tXAPP2\\n\\tSource Network Address:\\t60.228.161.56\\n\\tSource Port:\\t\\t56518\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tUser32 \\n\\tAuthentication Package:\\tNegotiate\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"xapp2.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{20df3bf1-47ce-4359-a9db-b09eacb45401}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"xapp2.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"Negotiate\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"60.228.161.56\",\"IpPort\":\"56518\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"User32 \",\"LogonType\":\"10\",\"ProcessId\":\"0xc4c\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\svchost.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"OSCORP\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"XAPP2$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"oscorp.org\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"XAPP2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":1516,\"thread\":{\"id\":3952}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7937355,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "xapp2.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "7937355", "streamName": "microsoft-windows-security-auditing", "clientIP": "60.228.161.56", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tOSCORP\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\toscorp.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t60.228.161.56\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"xapp2.oscorp.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.oscorp.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"60.228.161.56","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"OSCORP","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"oscorp.org","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tOSCORP\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\toscorp.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t60.228.161.56\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"xapp2.oscorp.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.oscorp.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"60.228.161.56","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"OSCORP","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"oscorp.org","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 56518 messagetype: auth_failure productids: [6] senderhost: xapp2.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 7937355 streamName: microsoft-windows-security-auditing clientIP: 60.228.161.56 userName: nighthawk
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tOSCORP\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\toscorp.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t6.162.212.186\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"xapp2.oscorp.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.oscorp.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"6.162.212.186","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"OSCORP","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"oscorp.org","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}}
{ "action": "Logon", "clientport": 56518, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-03T13:13:57.972Z\",\"agent\":{\"ephemeral_id\":\"b984cc9c-1997-44b4-bc3c-b7c53627b596\",\"id\":\"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6\",\"name\":\"xapp2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-03T13:13:59.640Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"xapp2.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tXAPP2$\\n\\tAccount Domain:\\t\\tOSCORP\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t10\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\toscorp.org\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0xc4c\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\svchost.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tXAPP2\\n\\tSource Network Address:\\t6.162.212.186\\n\\tSource Port:\\t\\t56518\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tUser32 \\n\\tAuthentication Package:\\tNegotiate\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"xapp2.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{20df3bf1-47ce-4359-a9db-b09eacb45401}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"xapp2.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"Negotiate\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"6.162.212.186\",\"IpPort\":\"56518\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"User32 \",\"LogonType\":\"10\",\"ProcessId\":\"0xc4c\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\svchost.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"OSCORP\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"XAPP2$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"oscorp.org\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"XAPP2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":1516,\"thread\":{\"id\":3952}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7937355,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "xapp2.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "7937355", "streamName": "microsoft-windows-security-auditing", "clientIP": "6.162.212.186", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tOSCORP\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\toscorp.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t6.162.212.186\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"xapp2.oscorp.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.oscorp.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"6.162.212.186","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"OSCORP","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"oscorp.org","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tOSCORP\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\toscorp.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t6.162.212.186\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"xapp2.oscorp.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.oscorp.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"6.162.212.186","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"OSCORP","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"oscorp.org","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 56518 messagetype: auth_failure productids: [6] senderhost: xapp2.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 7937355 streamName: microsoft-windows-security-auditing clientIP: 6.162.212.186 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tACME\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tacme.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t212.21.74.176\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"xapp2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.acme.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"212.21.74.176","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"ACME","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"acme.org","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}}
{ "action": "Logon", "clientport": 56518, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-03T13:13:57.972Z\",\"agent\":{\"ephemeral_id\":\"b984cc9c-1997-44b4-bc3c-b7c53627b596\",\"id\":\"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6\",\"name\":\"xapp2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-03T13:13:59.640Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"xapp2.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tXAPP2$\\n\\tAccount Domain:\\t\\tACME\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t10\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tacme.org\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0xc4c\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\svchost.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tXAPP2\\n\\tSource Network Address:\\t212.21.74.176\\n\\tSource Port:\\t\\t56518\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tUser32 \\n\\tAuthentication Package:\\tNegotiate\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"xapp2.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{20df3bf1-47ce-4359-a9db-b09eacb45401}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"xapp2.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"Negotiate\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"212.21.74.176\",\"IpPort\":\"56518\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"User32 \",\"LogonType\":\"10\",\"ProcessId\":\"0xc4c\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\svchost.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"ACME\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"XAPP2$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"acme.org\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"XAPP2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":1516,\"thread\":{\"id\":3952}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7937355,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "xapp2.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "7937355", "streamName": "microsoft-windows-security-auditing", "clientIP": "212.21.74.176", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tACME\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tacme.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t212.21.74.176\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"xapp2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.acme.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"212.21.74.176","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"ACME","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"acme.org","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tACME\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tacme.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t212.21.74.176\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"xapp2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.acme.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"212.21.74.176","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"ACME","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"acme.org","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 56518 messagetype: auth_failure productids: [6] senderhost: xapp2.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 7937355 streamName: microsoft-windows-security-auditing clientIP: 212.21.74.176 userName: alice
Explain this syslog message
<172>Feb 23 2023 13:33:07 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:217.29.147.226/50990 dst outside:193.9.13.114/80 by access-group "inside"
{ "priority": 172, "senderhost": "10.52.255.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 23 2023 13:33:07 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:217.29.147.226/50990 dst outside:193.9.13.114/80 by access-group \"inside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 50990, "vendorcode": "PIX-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "217.29.147.226", "serverIP": "193.9.13.114" }
Create a JSON artifact from the message
<172>Feb 23 2023 13:33:07 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:217.29.147.226/50990 dst outside:193.9.13.114/80 by access-group "inside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 23 2023 13:33:07 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:217.29.147.226/50990 dst outside:193.9.13.114/80 by access-group "inside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 serverport: 80 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 50990 vendorcode: PIX-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_pix clientIP: 217.29.147.226 serverIP: 193.9.13.114
Explain this syslog message
<172>Feb 23 2023 13:33:07 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:30.105.160.190/50990 dst outside:88.113.170.227/80 by access-group "inside"
{ "priority": 172, "senderhost": "10.52.255.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 23 2023 13:33:07 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:30.105.160.190/50990 dst outside:88.113.170.227/80 by access-group \"inside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 50990, "vendorcode": "PIX-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "30.105.160.190", "serverIP": "88.113.170.227" }
Create a JSON artifact from the message
<172>Feb 23 2023 13:33:07 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:30.105.160.190/50990 dst outside:88.113.170.227/80 by access-group "inside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 23 2023 13:33:07 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:30.105.160.190/50990 dst outside:88.113.170.227/80 by access-group "inside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 serverport: 80 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 50990 vendorcode: PIX-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_pix clientIP: 30.105.160.190 serverIP: 88.113.170.227
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.puriblood.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"208.90.163.155","externalIp":"3.16.109.220","categories":["Malware"],"tags":[],"destination":"www.puriblood.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-23T18:55:18.000Z"} ::: clientIP=208.90.163.155 ::: serverIP=3.16.109.220 ::: userName=johndoe ::: created_at=2022-05-23T18:55:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T18:55:18.000Z ::: serverHostname=www.puriblood.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-23T18:55:18.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.puriblood.com ::: action=BLOCKED ::: message={\"originId\":535235038,\"originType\":\"Network Devices\",\"internalIp\":\"208.90.163.155\",\"externalIp\":\"3.16.109.220\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.puriblood.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-23T18:55:18.000Z\"} ::: clientIP=208.90.163.155 ::: serverIP=3.16.109.220 ::: userName=johndoe ::: created_at=2022-05-23T18:55:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T18:55:18.000Z ::: serverHostname=www.puriblood.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.puriblood.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.puriblood.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "208.90.163.155", "serverIP": "3.16.109.220", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.puriblood.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"208.90.163.155","externalIp":"3.16.109.220","categories":["Malware"],"tags":[],"destination":"www.puriblood.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-23T18:55:18.000Z"} ::: clientIP=208.90.163.155 ::: serverIP=3.16.109.220 ::: userName=johndoe ::: created_at=2022-05-23T18:55:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T18:55:18.000Z ::: serverHostname=www.puriblood.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.puriblood.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"208.90.163.155","externalIp":"3.16.109.220","categories":["Malware"],"tags":[],"destination":"www.puriblood.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-23T18:55:18.000Z"} ::: clientIP=208.90.163.155 ::: serverIP=3.16.109.220 ::: userName=johndoe ::: created_at=2022-05-23T18:55:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T18:55:18.000Z ::: serverHostname=www.puriblood.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-23T18:55:18.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.puriblood.com messagetype: firewall_action severitycode: 2 fqdn: www.puriblood.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 208.90.163.155 serverIP: 3.16.109.220 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.puriblood.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"88.108.80.199","externalIp":"5.35.135.98","categories":["Malware"],"tags":[],"destination":"www.puriblood.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-23T18:55:18.000Z"} ::: clientIP=88.108.80.199 ::: serverIP=5.35.135.98 ::: userName=alice ::: created_at=2022-05-23T18:55:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T18:55:18.000Z ::: serverHostname=www.puriblood.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-23T18:55:18.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.puriblood.com ::: action=BLOCKED ::: message={\"originId\":535235038,\"originType\":\"Network Devices\",\"internalIp\":\"88.108.80.199\",\"externalIp\":\"5.35.135.98\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.puriblood.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-23T18:55:18.000Z\"} ::: clientIP=88.108.80.199 ::: serverIP=5.35.135.98 ::: userName=alice ::: created_at=2022-05-23T18:55:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T18:55:18.000Z ::: serverHostname=www.puriblood.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.puriblood.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.puriblood.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "88.108.80.199", "serverIP": "5.35.135.98", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.puriblood.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"88.108.80.199","externalIp":"5.35.135.98","categories":["Malware"],"tags":[],"destination":"www.puriblood.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-23T18:55:18.000Z"} ::: clientIP=88.108.80.199 ::: serverIP=5.35.135.98 ::: userName=alice ::: created_at=2022-05-23T18:55:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T18:55:18.000Z ::: serverHostname=www.puriblood.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.puriblood.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"88.108.80.199","externalIp":"5.35.135.98","categories":["Malware"],"tags":[],"destination":"www.puriblood.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-23T18:55:18.000Z"} ::: clientIP=88.108.80.199 ::: serverIP=5.35.135.98 ::: userName=alice ::: created_at=2022-05-23T18:55:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T18:55:18.000Z ::: serverHostname=www.puriblood.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-23T18:55:18.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.puriblood.com messagetype: firewall_action severitycode: 2 fqdn: www.puriblood.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 88.108.80.199 serverIP: 5.35.135.98 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"93.254.116.154","externalIp":"171.179.193.68","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=93.254.116.154 ::: serverIP=171.179.193.68 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-22T14:41:18.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"93.254.116.154\",\"externalIp\":\"171.179.193.68\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-22T14:41:18.000Z\"} ::: clientIP=93.254.116.154 ::: serverIP=171.179.193.68 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "93.254.116.154", "serverIP": "171.179.193.68", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"93.254.116.154","externalIp":"171.179.193.68","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=93.254.116.154 ::: serverIP=171.179.193.68 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"93.254.116.154","externalIp":"171.179.193.68","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=93.254.116.154 ::: serverIP=171.179.193.68 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-22T14:41:18.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 93.254.116.154 serverIP: 171.179.193.68 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"42.9.184.139","externalIp":"19.152.63.72","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=42.9.184.139 ::: serverIP=19.152.63.72 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-22T14:41:18.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"42.9.184.139\",\"externalIp\":\"19.152.63.72\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-22T14:41:18.000Z\"} ::: clientIP=42.9.184.139 ::: serverIP=19.152.63.72 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "42.9.184.139", "serverIP": "19.152.63.72", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"42.9.184.139","externalIp":"19.152.63.72","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=42.9.184.139 ::: serverIP=19.152.63.72 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"42.9.184.139","externalIp":"19.152.63.72","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=42.9.184.139 ::: serverIP=19.152.63.72 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-22T14:41:18.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 42.9.184.139 serverIP: 19.152.63.72 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"255.63.53.94","externalIp":"170.46.145.118","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=255.63.53.94 ::: serverIP=170.46.145.118 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-22T14:41:18.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"255.63.53.94\",\"externalIp\":\"170.46.145.118\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-22T14:41:18.000Z\"} ::: clientIP=255.63.53.94 ::: serverIP=170.46.145.118 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "255.63.53.94", "serverIP": "170.46.145.118", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"255.63.53.94","externalIp":"170.46.145.118","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=255.63.53.94 ::: serverIP=170.46.145.118 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"255.63.53.94","externalIp":"170.46.145.118","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=255.63.53.94 ::: serverIP=170.46.145.118 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-22T14:41:18.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 255.63.53.94 serverIP: 170.46.145.118 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"65.110.165.225","externalIp":"12.161.185.19","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=65.110.165.225 ::: serverIP=12.161.185.19 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-22T14:41:18.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"65.110.165.225\",\"externalIp\":\"12.161.185.19\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-22T14:41:18.000Z\"} ::: clientIP=65.110.165.225 ::: serverIP=12.161.185.19 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "65.110.165.225", "serverIP": "12.161.185.19", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"65.110.165.225","externalIp":"12.161.185.19","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=65.110.165.225 ::: serverIP=12.161.185.19 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"65.110.165.225","externalIp":"12.161.185.19","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=65.110.165.225 ::: serverIP=12.161.185.19 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-22T14:41:18.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 65.110.165.225 serverIP: 12.161.185.19 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"154.115.208.44","externalIp":"66.202.106.213","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=154.115.208.44 ::: serverIP=66.202.106.213 ::: userName=nighthawk ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-25T13:53:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"154.115.208.44\",\"externalIp\":\"66.202.106.213\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-25T13:53:19.000Z\"} ::: clientIP=154.115.208.44 ::: serverIP=66.202.106.213 ::: userName=nighthawk ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "154.115.208.44", "serverIP": "66.202.106.213", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"154.115.208.44","externalIp":"66.202.106.213","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=154.115.208.44 ::: serverIP=66.202.106.213 ::: userName=nighthawk ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"154.115.208.44","externalIp":"66.202.106.213","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=154.115.208.44 ::: serverIP=66.202.106.213 ::: userName=nighthawk ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-25T13:53:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 154.115.208.44 serverIP: 66.202.106.213 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"111.253.219.15","externalIp":"116.229.51.105","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=111.253.219.15 ::: serverIP=116.229.51.105 ::: userName=bob ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-25T13:53:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"111.253.219.15\",\"externalIp\":\"116.229.51.105\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-25T13:53:19.000Z\"} ::: clientIP=111.253.219.15 ::: serverIP=116.229.51.105 ::: userName=bob ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "111.253.219.15", "serverIP": "116.229.51.105", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"111.253.219.15","externalIp":"116.229.51.105","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=111.253.219.15 ::: serverIP=116.229.51.105 ::: userName=bob ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"111.253.219.15","externalIp":"116.229.51.105","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=111.253.219.15 ::: serverIP=116.229.51.105 ::: userName=bob ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-25T13:53:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 111.253.219.15 serverIP: 116.229.51.105 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"118.123.223.241","externalIp":"217.54.24.249","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=118.123.223.241 ::: serverIP=217.54.24.249 ::: userName=alice ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-22T14:41:18.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"118.123.223.241\",\"externalIp\":\"217.54.24.249\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-22T14:41:18.000Z\"} ::: clientIP=118.123.223.241 ::: serverIP=217.54.24.249 ::: userName=alice ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "118.123.223.241", "serverIP": "217.54.24.249", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"118.123.223.241","externalIp":"217.54.24.249","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=118.123.223.241 ::: serverIP=217.54.24.249 ::: userName=alice ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"118.123.223.241","externalIp":"217.54.24.249","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=118.123.223.241 ::: serverIP=217.54.24.249 ::: userName=alice ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-22T14:41:18.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 118.123.223.241 serverIP: 217.54.24.249 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"11.78.163.183","externalIp":"114.91.136.123","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=11.78.163.183 ::: serverIP=114.91.136.123 ::: userName=janedoe ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-22T14:41:18.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"11.78.163.183\",\"externalIp\":\"114.91.136.123\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-22T14:41:18.000Z\"} ::: clientIP=11.78.163.183 ::: serverIP=114.91.136.123 ::: userName=janedoe ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "11.78.163.183", "serverIP": "114.91.136.123", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"11.78.163.183","externalIp":"114.91.136.123","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=11.78.163.183 ::: serverIP=114.91.136.123 ::: userName=janedoe ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"11.78.163.183","externalIp":"114.91.136.123","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=11.78.163.183 ::: serverIP=114.91.136.123 ::: userName=janedoe ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-22T14:41:18.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 11.78.163.183 serverIP: 114.91.136.123 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"97.232.192.243","externalIp":"53.27.43.53","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=97.232.192.243 ::: serverIP=53.27.43.53 ::: userName=bob ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-25T13:53:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"97.232.192.243\",\"externalIp\":\"53.27.43.53\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-25T13:53:19.000Z\"} ::: clientIP=97.232.192.243 ::: serverIP=53.27.43.53 ::: userName=bob ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "97.232.192.243", "serverIP": "53.27.43.53", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"97.232.192.243","externalIp":"53.27.43.53","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=97.232.192.243 ::: serverIP=53.27.43.53 ::: userName=bob ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"97.232.192.243","externalIp":"53.27.43.53","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=97.232.192.243 ::: serverIP=53.27.43.53 ::: userName=bob ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-25T13:53:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 97.232.192.243 serverIP: 53.27.43.53 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"151.193.236.193","externalIp":"255.186.104.74","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=151.193.236.193 ::: serverIP=255.186.104.74 ::: userName=charlie ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-25T13:53:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"151.193.236.193\",\"externalIp\":\"255.186.104.74\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-25T13:53:19.000Z\"} ::: clientIP=151.193.236.193 ::: serverIP=255.186.104.74 ::: userName=charlie ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "151.193.236.193", "serverIP": "255.186.104.74", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"151.193.236.193","externalIp":"255.186.104.74","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=151.193.236.193 ::: serverIP=255.186.104.74 ::: userName=charlie ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"151.193.236.193","externalIp":"255.186.104.74","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=151.193.236.193 ::: serverIP=255.186.104.74 ::: userName=charlie ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-25T13:53:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 151.193.236.193 serverIP: 255.186.104.74 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"15.195.217.155","externalIp":"182.207.200.126","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=15.195.217.155 ::: serverIP=182.207.200.126 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-18T01:51:20.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"15.195.217.155\",\"externalIp\":\"182.207.200.126\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:20.000Z\"} ::: clientIP=15.195.217.155 ::: serverIP=182.207.200.126 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "google-font.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "google-font.com", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "15.195.217.155", "serverIP": "182.207.200.126", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"15.195.217.155","externalIp":"182.207.200.126","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=15.195.217.155 ::: serverIP=182.207.200.126 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"15.195.217.155","externalIp":"182.207.200.126","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=15.195.217.155 ::: serverIP=182.207.200.126 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-18T01:51:20.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: google-font.com messagetype: firewall_action severitycode: 2 fqdn: google-font.com vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 15.195.217.155 serverIP: 182.207.200.126 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"252.182.99.48","externalIp":"6.106.40.35","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=252.182.99.48 ::: serverIP=6.106.40.35 ::: userName=johndoe ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-18T01:51:20.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"252.182.99.48\",\"externalIp\":\"6.106.40.35\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:20.000Z\"} ::: clientIP=252.182.99.48 ::: serverIP=6.106.40.35 ::: userName=johndoe ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "google-font.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "google-font.com", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "252.182.99.48", "serverIP": "6.106.40.35", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"252.182.99.48","externalIp":"6.106.40.35","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=252.182.99.48 ::: serverIP=6.106.40.35 ::: userName=johndoe ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"252.182.99.48","externalIp":"6.106.40.35","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=252.182.99.48 ::: serverIP=6.106.40.35 ::: userName=johndoe ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-18T01:51:20.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: google-font.com messagetype: firewall_action severitycode: 2 fqdn: google-font.com vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 252.182.99.48 serverIP: 6.106.40.35 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"91.223.225.225","externalIp":"247.7.104.223","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=91.223.225.225 ::: serverIP=247.7.104.223 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-08T12:55:34.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"91.223.225.225\",\"externalIp\":\"247.7.104.223\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-08T12:55:34.000Z\"} ::: clientIP=91.223.225.225 ::: serverIP=247.7.104.223 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "plants.appcnt.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "plants.appcnt.com", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "91.223.225.225", "serverIP": "247.7.104.223", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"91.223.225.225","externalIp":"247.7.104.223","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=91.223.225.225 ::: serverIP=247.7.104.223 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"91.223.225.225","externalIp":"247.7.104.223","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=91.223.225.225 ::: serverIP=247.7.104.223 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-08T12:55:34.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: plants.appcnt.com messagetype: firewall_action severitycode: 2 fqdn: plants.appcnt.com vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 91.223.225.225 serverIP: 247.7.104.223 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"54.98.193.55","externalIp":"129.53.203.139","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=54.98.193.55 ::: serverIP=129.53.203.139 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-08T12:55:34.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"54.98.193.55\",\"externalIp\":\"129.53.203.139\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-08T12:55:34.000Z\"} ::: clientIP=54.98.193.55 ::: serverIP=129.53.203.139 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "plants.appcnt.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "plants.appcnt.com", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "54.98.193.55", "serverIP": "129.53.203.139", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"54.98.193.55","externalIp":"129.53.203.139","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=54.98.193.55 ::: serverIP=129.53.203.139 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"54.98.193.55","externalIp":"129.53.203.139","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=54.98.193.55 ::: serverIP=129.53.203.139 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-08T12:55:34.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: plants.appcnt.com messagetype: firewall_action severitycode: 2 fqdn: plants.appcnt.com vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 54.98.193.55 serverIP: 129.53.203.139 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"177.239.175.192","externalIp":"166.225.233.1","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=177.239.175.192 ::: serverIP=166.225.233.1 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-18T01:51:20.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"177.239.175.192\",\"externalIp\":\"166.225.233.1\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:20.000Z\"} ::: clientIP=177.239.175.192 ::: serverIP=166.225.233.1 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "google-font.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "google-font.com", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "177.239.175.192", "serverIP": "166.225.233.1", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"177.239.175.192","externalIp":"166.225.233.1","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=177.239.175.192 ::: serverIP=166.225.233.1 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"177.239.175.192","externalIp":"166.225.233.1","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=177.239.175.192 ::: serverIP=166.225.233.1 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-18T01:51:20.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: google-font.com messagetype: firewall_action severitycode: 2 fqdn: google-font.com vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 177.239.175.192 serverIP: 166.225.233.1 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"39.193.201.86","externalIp":"166.210.119.192","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=39.193.201.86 ::: serverIP=166.210.119.192 ::: userName=charlie ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-18T01:51:20.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"39.193.201.86\",\"externalIp\":\"166.210.119.192\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:20.000Z\"} ::: clientIP=39.193.201.86 ::: serverIP=166.210.119.192 ::: userName=charlie ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "google-font.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "google-font.com", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "39.193.201.86", "serverIP": "166.210.119.192", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"39.193.201.86","externalIp":"166.210.119.192","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=39.193.201.86 ::: serverIP=166.210.119.192 ::: userName=charlie ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"39.193.201.86","externalIp":"166.210.119.192","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=39.193.201.86 ::: serverIP=166.210.119.192 ::: userName=charlie ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-18T01:51:20.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: google-font.com messagetype: firewall_action severitycode: 2 fqdn: google-font.com vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 39.193.201.86 serverIP: 166.210.119.192 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"34.49.172.183","externalIp":"121.73.78.106","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=34.49.172.183 ::: serverIP=121.73.78.106 ::: userName=johndoe ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-08T12:55:34.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"34.49.172.183\",\"externalIp\":\"121.73.78.106\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-08T12:55:34.000Z\"} ::: clientIP=34.49.172.183 ::: serverIP=121.73.78.106 ::: userName=johndoe ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "plants.appcnt.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "plants.appcnt.com", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "34.49.172.183", "serverIP": "121.73.78.106", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"34.49.172.183","externalIp":"121.73.78.106","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=34.49.172.183 ::: serverIP=121.73.78.106 ::: userName=johndoe ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"34.49.172.183","externalIp":"121.73.78.106","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=34.49.172.183 ::: serverIP=121.73.78.106 ::: userName=johndoe ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-08T12:55:34.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: plants.appcnt.com messagetype: firewall_action severitycode: 2 fqdn: plants.appcnt.com vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 34.49.172.183 serverIP: 121.73.78.106 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"172.198.164.247","externalIp":"73.26.159.146","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=172.198.164.247 ::: serverIP=73.26.159.146 ::: userName=fish ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-08T12:55:34.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"172.198.164.247\",\"externalIp\":\"73.26.159.146\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-08T12:55:34.000Z\"} ::: clientIP=172.198.164.247 ::: serverIP=73.26.159.146 ::: userName=fish ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "plants.appcnt.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "plants.appcnt.com", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "172.198.164.247", "serverIP": "73.26.159.146", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"172.198.164.247","externalIp":"73.26.159.146","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=172.198.164.247 ::: serverIP=73.26.159.146 ::: userName=fish ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"172.198.164.247","externalIp":"73.26.159.146","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=172.198.164.247 ::: serverIP=73.26.159.146 ::: userName=fish ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-08T12:55:34.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: plants.appcnt.com messagetype: firewall_action severitycode: 2 fqdn: plants.appcnt.com vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 172.198.164.247 serverIP: 73.26.159.146 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"169.129.194.54","externalIp":"44.37.25.195","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=169.129.194.54 ::: serverIP=44.37.25.195 ::: userName=charlie ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-18T01:51:20.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"169.129.194.54\",\"externalIp\":\"44.37.25.195\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:20.000Z\"} ::: clientIP=169.129.194.54 ::: serverIP=44.37.25.195 ::: userName=charlie ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "google-font.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "google-font.com", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "169.129.194.54", "serverIP": "44.37.25.195", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"169.129.194.54","externalIp":"44.37.25.195","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=169.129.194.54 ::: serverIP=44.37.25.195 ::: userName=charlie ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"169.129.194.54","externalIp":"44.37.25.195","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=169.129.194.54 ::: serverIP=44.37.25.195 ::: userName=charlie ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-18T01:51:20.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: google-font.com messagetype: firewall_action severitycode: 2 fqdn: google-font.com vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 169.129.194.54 serverIP: 44.37.25.195 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"187.107.23.37","externalIp":"231.49.82.85","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=187.107.23.37 ::: serverIP=231.49.82.85 ::: userName=johndoe ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-18T01:51:20.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"187.107.23.37\",\"externalIp\":\"231.49.82.85\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:20.000Z\"} ::: clientIP=187.107.23.37 ::: serverIP=231.49.82.85 ::: userName=johndoe ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "google-font.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "google-font.com", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "187.107.23.37", "serverIP": "231.49.82.85", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"187.107.23.37","externalIp":"231.49.82.85","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=187.107.23.37 ::: serverIP=231.49.82.85 ::: userName=johndoe ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"187.107.23.37","externalIp":"231.49.82.85","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=187.107.23.37 ::: serverIP=231.49.82.85 ::: userName=johndoe ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-18T01:51:20.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: google-font.com messagetype: firewall_action severitycode: 2 fqdn: google-font.com vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 187.107.23.37 serverIP: 231.49.82.85 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"203.142.245.203","externalIp":"191.178.98.164","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=203.142.245.203 ::: serverIP=191.178.98.164 ::: userName=johndoe ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-08T12:55:34.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"203.142.245.203\",\"externalIp\":\"191.178.98.164\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-08T12:55:34.000Z\"} ::: clientIP=203.142.245.203 ::: serverIP=191.178.98.164 ::: userName=johndoe ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "plants.appcnt.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "plants.appcnt.com", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "203.142.245.203", "serverIP": "191.178.98.164", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"203.142.245.203","externalIp":"191.178.98.164","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=203.142.245.203 ::: serverIP=191.178.98.164 ::: userName=johndoe ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"203.142.245.203","externalIp":"191.178.98.164","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=203.142.245.203 ::: serverIP=191.178.98.164 ::: userName=johndoe ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-08T12:55:34.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: plants.appcnt.com messagetype: firewall_action severitycode: 2 fqdn: plants.appcnt.com vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 203.142.245.203 serverIP: 191.178.98.164 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"35.128.162.63","externalIp":"14.9.75.222","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=35.128.162.63 ::: serverIP=14.9.75.222 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-08T12:55:34.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"35.128.162.63\",\"externalIp\":\"14.9.75.222\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-08T12:55:34.000Z\"} ::: clientIP=35.128.162.63 ::: serverIP=14.9.75.222 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "plants.appcnt.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "plants.appcnt.com", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "35.128.162.63", "serverIP": "14.9.75.222", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"35.128.162.63","externalIp":"14.9.75.222","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=35.128.162.63 ::: serverIP=14.9.75.222 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"35.128.162.63","externalIp":"14.9.75.222","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=35.128.162.63 ::: serverIP=14.9.75.222 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-08T12:55:34.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: plants.appcnt.com messagetype: firewall_action severitycode: 2 fqdn: plants.appcnt.com vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 35.128.162.63 serverIP: 14.9.75.222 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"192.223.25.162","externalIp":"162.129.60.159","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=192.223.25.162 ::: serverIP=162.129.60.159 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-24T16:55:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"192.223.25.162\",\"externalIp\":\"162.129.60.159\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:15.000Z\"} ::: clientIP=192.223.25.162 ::: serverIP=162.129.60.159 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "192.223.25.162", "serverIP": "162.129.60.159", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"192.223.25.162","externalIp":"162.129.60.159","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=192.223.25.162 ::: serverIP=162.129.60.159 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message