input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"102.221.122.158","externalIp":"78.111.149.83","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=102.221.122.158 ::: serverIP=78.111.149.83 ::: userName=fish ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"102.221.122.158","externalIp":"78.111.149.83","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=102.221.122.158 ::: serverIP=78.111.149.83 ::: userName=fish ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-09T19:51:35.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: compete4.buzz
messagetype: firewall_action
severitycode: 2
fqdn: compete4.buzz
vendorcode: PhishingNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 102.221.122.158
serverIP: 78.111.149.83
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"213.30.72.190","externalIp":"229.230.41.218","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=213.30.72.190 ::: serverIP=229.230.41.218 ::: userName=bob ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-09T19:51:35.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"213.30.72.190\",\"externalIp\":\"229.230.41.218\",\"categories\":[\"Phishing\",\"Not Actionable\"],\"tags\":[],\"destination\":\"compete4.buzz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-09T19:51:35.000Z\"} ::: clientIP=213.30.72.190 ::: serverIP=229.230.41.218 ::: userName=bob ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "compete4.buzz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "compete4.buzz",
"vendorcode": "PhishingNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "213.30.72.190",
"serverIP": "229.230.41.218",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"213.30.72.190","externalIp":"229.230.41.218","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=213.30.72.190 ::: serverIP=229.230.41.218 ::: userName=bob ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"213.30.72.190","externalIp":"229.230.41.218","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=213.30.72.190 ::: serverIP=229.230.41.218 ::: userName=bob ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-09T19:51:35.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: compete4.buzz
messagetype: firewall_action
severitycode: 2
fqdn: compete4.buzz
vendorcode: PhishingNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 213.30.72.190
serverIP: 229.230.41.218
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"250.12.216.155","externalIp":"127.226.245.127","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=250.12.216.155 ::: serverIP=127.226.245.127 ::: userName=johndoe ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-09T19:51:35.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"250.12.216.155\",\"externalIp\":\"127.226.245.127\",\"categories\":[\"Phishing\",\"Not Actionable\"],\"tags\":[],\"destination\":\"compete4.buzz\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-09T19:51:35.000Z\"} ::: clientIP=250.12.216.155 ::: serverIP=127.226.245.127 ::: userName=johndoe ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "compete4.buzz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "compete4.buzz",
"vendorcode": "PhishingNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "250.12.216.155",
"serverIP": "127.226.245.127",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"250.12.216.155","externalIp":"127.226.245.127","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=250.12.216.155 ::: serverIP=127.226.245.127 ::: userName=johndoe ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=compete4.buzz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"250.12.216.155","externalIp":"127.226.245.127","categories":["Phishing","Not Actionable"],"tags":[],"destination":"compete4.buzz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-09T19:51:35.000Z"} ::: clientIP=250.12.216.155 ::: serverIP=127.226.245.127 ::: userName=johndoe ::: created_at=2022-08-09T19:51:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-09T19:51:35.000Z ::: serverHostname=compete4.buzz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-09T19:51:35.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: compete4.buzz
messagetype: firewall_action
severitycode: 2
fqdn: compete4.buzz
vendorcode: PhishingNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 250.12.216.155
serverIP: 127.226.245.127
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tWAYNE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\twayne.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t68.98.253.108\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"xapp2.wayne.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.wayne.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"68.98.253.108","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"WAYNE","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"wayne.org","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}} | {
"action": "Logon",
"clientport": 56518,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-03T13:13:57.972Z\",\"agent\":{\"ephemeral_id\":\"b984cc9c-1997-44b4-bc3c-b7c53627b596\",\"id\":\"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6\",\"name\":\"xapp2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-03T13:13:59.640Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"xapp2.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tXAPP2$\\n\\tAccount Domain:\\t\\tWAYNE\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t10\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\twayne.org\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0xc4c\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\svchost.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tXAPP2\\n\\tSource Network Address:\\t68.98.253.108\\n\\tSource Port:\\t\\t56518\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tUser32 \\n\\tAuthentication Package:\\tNegotiate\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"xapp2.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{20df3bf1-47ce-4359-a9db-b09eacb45401}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"xapp2.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"Negotiate\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"68.98.253.108\",\"IpPort\":\"56518\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"User32 \",\"LogonType\":\"10\",\"ProcessId\":\"0xc4c\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\svchost.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"WAYNE\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"XAPP2$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"wayne.org\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"XAPP2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":1516,\"thread\":{\"id\":3952}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7937355,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "xapp2.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "7937355",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "68.98.253.108",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tWAYNE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\twayne.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t68.98.253.108\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"xapp2.wayne.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.wayne.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"68.98.253.108","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"WAYNE","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"wayne.org","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tWAYNE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\twayne.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t68.98.253.108\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"xapp2.wayne.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.wayne.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"68.98.253.108","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"WAYNE","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"wayne.org","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 56518
messagetype: auth_failure
productids: [6]
senderhost: xapp2.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 7937355
streamName: microsoft-windows-security-auditing
clientIP: 68.98.253.108
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tOSCORP\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\toscorp.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t60.228.161.56\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"xapp2.oscorp.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.oscorp.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"60.228.161.56","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"OSCORP","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"oscorp.org","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}} | {
"action": "Logon",
"clientport": 56518,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-03T13:13:57.972Z\",\"agent\":{\"ephemeral_id\":\"b984cc9c-1997-44b4-bc3c-b7c53627b596\",\"id\":\"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6\",\"name\":\"xapp2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-03T13:13:59.640Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"xapp2.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tXAPP2$\\n\\tAccount Domain:\\t\\tOSCORP\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t10\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\toscorp.org\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0xc4c\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\svchost.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tXAPP2\\n\\tSource Network Address:\\t60.228.161.56\\n\\tSource Port:\\t\\t56518\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tUser32 \\n\\tAuthentication Package:\\tNegotiate\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"xapp2.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{20df3bf1-47ce-4359-a9db-b09eacb45401}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"xapp2.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"Negotiate\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"60.228.161.56\",\"IpPort\":\"56518\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"User32 \",\"LogonType\":\"10\",\"ProcessId\":\"0xc4c\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\svchost.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"OSCORP\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"XAPP2$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"oscorp.org\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"XAPP2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":1516,\"thread\":{\"id\":3952}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7937355,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "xapp2.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "7937355",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "60.228.161.56",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tOSCORP\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\toscorp.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t60.228.161.56\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"xapp2.oscorp.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.oscorp.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"60.228.161.56","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"OSCORP","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"oscorp.org","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tOSCORP\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\toscorp.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t60.228.161.56\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"xapp2.oscorp.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.oscorp.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"60.228.161.56","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"OSCORP","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"oscorp.org","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 56518
messagetype: auth_failure
productids: [6]
senderhost: xapp2.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 7937355
streamName: microsoft-windows-security-auditing
clientIP: 60.228.161.56
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tOSCORP\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\toscorp.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t6.162.212.186\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"xapp2.oscorp.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.oscorp.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"6.162.212.186","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"OSCORP","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"oscorp.org","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}} | {
"action": "Logon",
"clientport": 56518,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-03T13:13:57.972Z\",\"agent\":{\"ephemeral_id\":\"b984cc9c-1997-44b4-bc3c-b7c53627b596\",\"id\":\"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6\",\"name\":\"xapp2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-03T13:13:59.640Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"xapp2.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tXAPP2$\\n\\tAccount Domain:\\t\\tOSCORP\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t10\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\toscorp.org\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0xc4c\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\svchost.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tXAPP2\\n\\tSource Network Address:\\t6.162.212.186\\n\\tSource Port:\\t\\t56518\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tUser32 \\n\\tAuthentication Package:\\tNegotiate\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"xapp2.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{20df3bf1-47ce-4359-a9db-b09eacb45401}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"xapp2.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"Negotiate\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"6.162.212.186\",\"IpPort\":\"56518\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"User32 \",\"LogonType\":\"10\",\"ProcessId\":\"0xc4c\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\svchost.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"OSCORP\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"XAPP2$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"oscorp.org\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"XAPP2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":1516,\"thread\":{\"id\":3952}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7937355,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "xapp2.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "7937355",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "6.162.212.186",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tOSCORP\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\toscorp.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t6.162.212.186\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"xapp2.oscorp.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.oscorp.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"6.162.212.186","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"OSCORP","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"oscorp.org","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tOSCORP\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\toscorp.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t6.162.212.186\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"xapp2.oscorp.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.oscorp.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"6.162.212.186","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"OSCORP","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"oscorp.org","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 56518
messagetype: auth_failure
productids: [6]
senderhost: xapp2.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 7937355
streamName: microsoft-windows-security-auditing
clientIP: 6.162.212.186
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tACME\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tacme.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t212.21.74.176\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"xapp2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.acme.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"212.21.74.176","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"ACME","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"acme.org","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}} | {
"action": "Logon",
"clientport": 56518,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-03T13:13:57.972Z\",\"agent\":{\"ephemeral_id\":\"b984cc9c-1997-44b4-bc3c-b7c53627b596\",\"id\":\"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6\",\"name\":\"xapp2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-03T13:13:59.640Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"xapp2.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tXAPP2$\\n\\tAccount Domain:\\t\\tACME\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t10\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tacme.org\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0xc4c\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\svchost.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tXAPP2\\n\\tSource Network Address:\\t212.21.74.176\\n\\tSource Port:\\t\\t56518\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tUser32 \\n\\tAuthentication Package:\\tNegotiate\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"xapp2.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{20df3bf1-47ce-4359-a9db-b09eacb45401}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"xapp2.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"Negotiate\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"212.21.74.176\",\"IpPort\":\"56518\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"User32 \",\"LogonType\":\"10\",\"ProcessId\":\"0xc4c\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\svchost.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"ACME\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"XAPP2$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"acme.org\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"XAPP2\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":1516,\"thread\":{\"id\":3952}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7937355,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "xapp2.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "7937355",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "212.21.74.176",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tACME\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tacme.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t212.21.74.176\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"xapp2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.acme.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"212.21.74.176","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"ACME","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"acme.org","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-03T13:13:57.972Z","agent":{"ephemeral_id":"b984cc9c-1997-44b4-bc3c-b7c53627b596","id":"0ea58e40-a9fe-4e21-8fbe-084fb84cabc6","name":"xapp2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-03T13:13:59.640Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"xapp2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tXAPP2$\n\tAccount Domain:\t\tACME\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t10\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tacme.org\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0xc4c\n\tCaller Process Name:\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tXAPP2\n\tSource Network Address:\t212.21.74.176\n\tSource Port:\t\t56518\n\nDetailed Authentication Information:\n\tLogon Process:\t\tUser32 \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"xapp2.acme.org","sensitivity":"normal","winlog":{"activity_id":"{20df3bf1-47ce-4359-a9db-b09eacb45401}","api":"wineventlog","channel":"Security","computer_name":"xapp2.acme.org","event_data":{"AuthenticationPackageName":"Negotiate","FailureReason":"%%2313","IpAddress":"212.21.74.176","IpPort":"56518","KeyLength":"0","LmPackageName":"-","LogonProcessName":"User32 ","LogonType":"10","ProcessId":"0xc4c","ProcessName":"C:\\Windows\\System32\\svchost.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"ACME","SubjectLogonId":"0x3e7","SubjectUserName":"XAPP2$","SubjectUserSid":"S-1-5-18","TargetDomainName":"acme.org","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP2"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":1516,"thread":{"id":3952}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7937355,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 56518
messagetype: auth_failure
productids: [6]
senderhost: xapp2.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 7937355
streamName: microsoft-windows-security-auditing
clientIP: 212.21.74.176
userName: alice | Explain this syslog message |
<172>Feb 23 2023 13:33:07 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:217.29.147.226/50990 dst outside:193.9.13.114/80 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 23 2023 13:33:07 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:217.29.147.226/50990 dst outside:193.9.13.114/80 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 50990,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "217.29.147.226",
"serverIP": "193.9.13.114"
} | Create a JSON artifact from the message |
<172>Feb 23 2023 13:33:07 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:217.29.147.226/50990 dst outside:193.9.13.114/80 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 23 2023 13:33:07 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:217.29.147.226/50990 dst outside:193.9.13.114/80 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 80
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 50990
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 217.29.147.226
serverIP: 193.9.13.114 | Explain this syslog message |
<172>Feb 23 2023 13:33:07 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:30.105.160.190/50990 dst outside:88.113.170.227/80 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 23 2023 13:33:07 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:30.105.160.190/50990 dst outside:88.113.170.227/80 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 50990,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "30.105.160.190",
"serverIP": "88.113.170.227"
} | Create a JSON artifact from the message |
<172>Feb 23 2023 13:33:07 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:30.105.160.190/50990 dst outside:88.113.170.227/80 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 23 2023 13:33:07 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:30.105.160.190/50990 dst outside:88.113.170.227/80 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 80
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 50990
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 30.105.160.190
serverIP: 88.113.170.227 | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.puriblood.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"208.90.163.155","externalIp":"3.16.109.220","categories":["Malware"],"tags":[],"destination":"www.puriblood.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-23T18:55:18.000Z"} ::: clientIP=208.90.163.155 ::: serverIP=3.16.109.220 ::: userName=johndoe ::: created_at=2022-05-23T18:55:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T18:55:18.000Z ::: serverHostname=www.puriblood.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-23T18:55:18.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.puriblood.com ::: action=BLOCKED ::: message={\"originId\":535235038,\"originType\":\"Network Devices\",\"internalIp\":\"208.90.163.155\",\"externalIp\":\"3.16.109.220\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.puriblood.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-23T18:55:18.000Z\"} ::: clientIP=208.90.163.155 ::: serverIP=3.16.109.220 ::: userName=johndoe ::: created_at=2022-05-23T18:55:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T18:55:18.000Z ::: serverHostname=www.puriblood.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.puriblood.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.puriblood.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "208.90.163.155",
"serverIP": "3.16.109.220",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.puriblood.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"208.90.163.155","externalIp":"3.16.109.220","categories":["Malware"],"tags":[],"destination":"www.puriblood.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-23T18:55:18.000Z"} ::: clientIP=208.90.163.155 ::: serverIP=3.16.109.220 ::: userName=johndoe ::: created_at=2022-05-23T18:55:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T18:55:18.000Z ::: serverHostname=www.puriblood.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.puriblood.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"208.90.163.155","externalIp":"3.16.109.220","categories":["Malware"],"tags":[],"destination":"www.puriblood.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-23T18:55:18.000Z"} ::: clientIP=208.90.163.155 ::: serverIP=3.16.109.220 ::: userName=johndoe ::: created_at=2022-05-23T18:55:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T18:55:18.000Z ::: serverHostname=www.puriblood.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-23T18:55:18.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.puriblood.com
messagetype: firewall_action
severitycode: 2
fqdn: www.puriblood.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 208.90.163.155
serverIP: 3.16.109.220
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.puriblood.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"88.108.80.199","externalIp":"5.35.135.98","categories":["Malware"],"tags":[],"destination":"www.puriblood.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-23T18:55:18.000Z"} ::: clientIP=88.108.80.199 ::: serverIP=5.35.135.98 ::: userName=alice ::: created_at=2022-05-23T18:55:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T18:55:18.000Z ::: serverHostname=www.puriblood.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-23T18:55:18.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.puriblood.com ::: action=BLOCKED ::: message={\"originId\":535235038,\"originType\":\"Network Devices\",\"internalIp\":\"88.108.80.199\",\"externalIp\":\"5.35.135.98\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.puriblood.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-23T18:55:18.000Z\"} ::: clientIP=88.108.80.199 ::: serverIP=5.35.135.98 ::: userName=alice ::: created_at=2022-05-23T18:55:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T18:55:18.000Z ::: serverHostname=www.puriblood.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.puriblood.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.puriblood.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "88.108.80.199",
"serverIP": "5.35.135.98",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.puriblood.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"88.108.80.199","externalIp":"5.35.135.98","categories":["Malware"],"tags":[],"destination":"www.puriblood.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-23T18:55:18.000Z"} ::: clientIP=88.108.80.199 ::: serverIP=5.35.135.98 ::: userName=alice ::: created_at=2022-05-23T18:55:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T18:55:18.000Z ::: serverHostname=www.puriblood.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.puriblood.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"88.108.80.199","externalIp":"5.35.135.98","categories":["Malware"],"tags":[],"destination":"www.puriblood.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-23T18:55:18.000Z"} ::: clientIP=88.108.80.199 ::: serverIP=5.35.135.98 ::: userName=alice ::: created_at=2022-05-23T18:55:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T18:55:18.000Z ::: serverHostname=www.puriblood.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-23T18:55:18.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.puriblood.com
messagetype: firewall_action
severitycode: 2
fqdn: www.puriblood.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 88.108.80.199
serverIP: 5.35.135.98
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"93.254.116.154","externalIp":"171.179.193.68","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=93.254.116.154 ::: serverIP=171.179.193.68 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-22T14:41:18.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"93.254.116.154\",\"externalIp\":\"171.179.193.68\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-22T14:41:18.000Z\"} ::: clientIP=93.254.116.154 ::: serverIP=171.179.193.68 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "93.254.116.154",
"serverIP": "171.179.193.68",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"93.254.116.154","externalIp":"171.179.193.68","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=93.254.116.154 ::: serverIP=171.179.193.68 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"93.254.116.154","externalIp":"171.179.193.68","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=93.254.116.154 ::: serverIP=171.179.193.68 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-22T14:41:18.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 93.254.116.154
serverIP: 171.179.193.68
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"42.9.184.139","externalIp":"19.152.63.72","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=42.9.184.139 ::: serverIP=19.152.63.72 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-22T14:41:18.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"42.9.184.139\",\"externalIp\":\"19.152.63.72\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-22T14:41:18.000Z\"} ::: clientIP=42.9.184.139 ::: serverIP=19.152.63.72 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "42.9.184.139",
"serverIP": "19.152.63.72",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"42.9.184.139","externalIp":"19.152.63.72","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=42.9.184.139 ::: serverIP=19.152.63.72 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"42.9.184.139","externalIp":"19.152.63.72","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=42.9.184.139 ::: serverIP=19.152.63.72 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-22T14:41:18.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 42.9.184.139
serverIP: 19.152.63.72
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"255.63.53.94","externalIp":"170.46.145.118","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=255.63.53.94 ::: serverIP=170.46.145.118 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-22T14:41:18.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"255.63.53.94\",\"externalIp\":\"170.46.145.118\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-22T14:41:18.000Z\"} ::: clientIP=255.63.53.94 ::: serverIP=170.46.145.118 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "255.63.53.94",
"serverIP": "170.46.145.118",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"255.63.53.94","externalIp":"170.46.145.118","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=255.63.53.94 ::: serverIP=170.46.145.118 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"255.63.53.94","externalIp":"170.46.145.118","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=255.63.53.94 ::: serverIP=170.46.145.118 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-22T14:41:18.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 255.63.53.94
serverIP: 170.46.145.118
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"65.110.165.225","externalIp":"12.161.185.19","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=65.110.165.225 ::: serverIP=12.161.185.19 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-22T14:41:18.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"65.110.165.225\",\"externalIp\":\"12.161.185.19\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-22T14:41:18.000Z\"} ::: clientIP=65.110.165.225 ::: serverIP=12.161.185.19 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "65.110.165.225",
"serverIP": "12.161.185.19",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"65.110.165.225","externalIp":"12.161.185.19","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=65.110.165.225 ::: serverIP=12.161.185.19 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"65.110.165.225","externalIp":"12.161.185.19","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=65.110.165.225 ::: serverIP=12.161.185.19 ::: userName=bob ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-22T14:41:18.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 65.110.165.225
serverIP: 12.161.185.19
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"154.115.208.44","externalIp":"66.202.106.213","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=154.115.208.44 ::: serverIP=66.202.106.213 ::: userName=nighthawk ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-25T13:53:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"154.115.208.44\",\"externalIp\":\"66.202.106.213\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-25T13:53:19.000Z\"} ::: clientIP=154.115.208.44 ::: serverIP=66.202.106.213 ::: userName=nighthawk ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "154.115.208.44",
"serverIP": "66.202.106.213",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"154.115.208.44","externalIp":"66.202.106.213","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=154.115.208.44 ::: serverIP=66.202.106.213 ::: userName=nighthawk ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"154.115.208.44","externalIp":"66.202.106.213","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=154.115.208.44 ::: serverIP=66.202.106.213 ::: userName=nighthawk ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-25T13:53:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 154.115.208.44
serverIP: 66.202.106.213
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"111.253.219.15","externalIp":"116.229.51.105","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=111.253.219.15 ::: serverIP=116.229.51.105 ::: userName=bob ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-25T13:53:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"111.253.219.15\",\"externalIp\":\"116.229.51.105\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-25T13:53:19.000Z\"} ::: clientIP=111.253.219.15 ::: serverIP=116.229.51.105 ::: userName=bob ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "111.253.219.15",
"serverIP": "116.229.51.105",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"111.253.219.15","externalIp":"116.229.51.105","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=111.253.219.15 ::: serverIP=116.229.51.105 ::: userName=bob ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"111.253.219.15","externalIp":"116.229.51.105","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=111.253.219.15 ::: serverIP=116.229.51.105 ::: userName=bob ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-25T13:53:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 111.253.219.15
serverIP: 116.229.51.105
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"118.123.223.241","externalIp":"217.54.24.249","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=118.123.223.241 ::: serverIP=217.54.24.249 ::: userName=alice ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-22T14:41:18.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"118.123.223.241\",\"externalIp\":\"217.54.24.249\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-22T14:41:18.000Z\"} ::: clientIP=118.123.223.241 ::: serverIP=217.54.24.249 ::: userName=alice ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "118.123.223.241",
"serverIP": "217.54.24.249",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"118.123.223.241","externalIp":"217.54.24.249","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=118.123.223.241 ::: serverIP=217.54.24.249 ::: userName=alice ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"118.123.223.241","externalIp":"217.54.24.249","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=118.123.223.241 ::: serverIP=217.54.24.249 ::: userName=alice ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-22T14:41:18.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 118.123.223.241
serverIP: 217.54.24.249
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"11.78.163.183","externalIp":"114.91.136.123","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=11.78.163.183 ::: serverIP=114.91.136.123 ::: userName=janedoe ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-22T14:41:18.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"11.78.163.183\",\"externalIp\":\"114.91.136.123\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-22T14:41:18.000Z\"} ::: clientIP=11.78.163.183 ::: serverIP=114.91.136.123 ::: userName=janedoe ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "11.78.163.183",
"serverIP": "114.91.136.123",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"11.78.163.183","externalIp":"114.91.136.123","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=11.78.163.183 ::: serverIP=114.91.136.123 ::: userName=janedoe ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"11.78.163.183","externalIp":"114.91.136.123","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-22T14:41:18.000Z"} ::: clientIP=11.78.163.183 ::: serverIP=114.91.136.123 ::: userName=janedoe ::: created_at=2022-07-22T14:41:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:41:18.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-22T14:41:18.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 11.78.163.183
serverIP: 114.91.136.123
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"97.232.192.243","externalIp":"53.27.43.53","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=97.232.192.243 ::: serverIP=53.27.43.53 ::: userName=bob ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-25T13:53:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"97.232.192.243\",\"externalIp\":\"53.27.43.53\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-25T13:53:19.000Z\"} ::: clientIP=97.232.192.243 ::: serverIP=53.27.43.53 ::: userName=bob ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "97.232.192.243",
"serverIP": "53.27.43.53",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"97.232.192.243","externalIp":"53.27.43.53","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=97.232.192.243 ::: serverIP=53.27.43.53 ::: userName=bob ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"97.232.192.243","externalIp":"53.27.43.53","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=97.232.192.243 ::: serverIP=53.27.43.53 ::: userName=bob ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-25T13:53:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 97.232.192.243
serverIP: 53.27.43.53
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"151.193.236.193","externalIp":"255.186.104.74","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=151.193.236.193 ::: serverIP=255.186.104.74 ::: userName=charlie ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-25T13:53:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"151.193.236.193\",\"externalIp\":\"255.186.104.74\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-25T13:53:19.000Z\"} ::: clientIP=151.193.236.193 ::: serverIP=255.186.104.74 ::: userName=charlie ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "151.193.236.193",
"serverIP": "255.186.104.74",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"151.193.236.193","externalIp":"255.186.104.74","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=151.193.236.193 ::: serverIP=255.186.104.74 ::: userName=charlie ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"151.193.236.193","externalIp":"255.186.104.74","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-25T13:53:19.000Z"} ::: clientIP=151.193.236.193 ::: serverIP=255.186.104.74 ::: userName=charlie ::: created_at=2022-07-25T13:53:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-25T13:53:19.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-25T13:53:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 151.193.236.193
serverIP: 255.186.104.74
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"15.195.217.155","externalIp":"182.207.200.126","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=15.195.217.155 ::: serverIP=182.207.200.126 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-18T01:51:20.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"15.195.217.155\",\"externalIp\":\"182.207.200.126\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:20.000Z\"} ::: clientIP=15.195.217.155 ::: serverIP=182.207.200.126 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "google-font.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "google-font.com",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "15.195.217.155",
"serverIP": "182.207.200.126",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"15.195.217.155","externalIp":"182.207.200.126","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=15.195.217.155 ::: serverIP=182.207.200.126 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"15.195.217.155","externalIp":"182.207.200.126","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=15.195.217.155 ::: serverIP=182.207.200.126 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-18T01:51:20.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: google-font.com
messagetype: firewall_action
severitycode: 2
fqdn: google-font.com
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 15.195.217.155
serverIP: 182.207.200.126
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"252.182.99.48","externalIp":"6.106.40.35","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=252.182.99.48 ::: serverIP=6.106.40.35 ::: userName=johndoe ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-18T01:51:20.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"252.182.99.48\",\"externalIp\":\"6.106.40.35\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:20.000Z\"} ::: clientIP=252.182.99.48 ::: serverIP=6.106.40.35 ::: userName=johndoe ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "google-font.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "google-font.com",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "252.182.99.48",
"serverIP": "6.106.40.35",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"252.182.99.48","externalIp":"6.106.40.35","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=252.182.99.48 ::: serverIP=6.106.40.35 ::: userName=johndoe ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"252.182.99.48","externalIp":"6.106.40.35","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=252.182.99.48 ::: serverIP=6.106.40.35 ::: userName=johndoe ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-18T01:51:20.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: google-font.com
messagetype: firewall_action
severitycode: 2
fqdn: google-font.com
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 252.182.99.48
serverIP: 6.106.40.35
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"91.223.225.225","externalIp":"247.7.104.223","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=91.223.225.225 ::: serverIP=247.7.104.223 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-08T12:55:34.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"91.223.225.225\",\"externalIp\":\"247.7.104.223\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-08T12:55:34.000Z\"} ::: clientIP=91.223.225.225 ::: serverIP=247.7.104.223 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "91.223.225.225",
"serverIP": "247.7.104.223",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"91.223.225.225","externalIp":"247.7.104.223","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=91.223.225.225 ::: serverIP=247.7.104.223 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"91.223.225.225","externalIp":"247.7.104.223","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=91.223.225.225 ::: serverIP=247.7.104.223 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-08T12:55:34.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 91.223.225.225
serverIP: 247.7.104.223
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"54.98.193.55","externalIp":"129.53.203.139","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=54.98.193.55 ::: serverIP=129.53.203.139 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-08T12:55:34.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"54.98.193.55\",\"externalIp\":\"129.53.203.139\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-08T12:55:34.000Z\"} ::: clientIP=54.98.193.55 ::: serverIP=129.53.203.139 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "54.98.193.55",
"serverIP": "129.53.203.139",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"54.98.193.55","externalIp":"129.53.203.139","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=54.98.193.55 ::: serverIP=129.53.203.139 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"54.98.193.55","externalIp":"129.53.203.139","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=54.98.193.55 ::: serverIP=129.53.203.139 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-08T12:55:34.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 54.98.193.55
serverIP: 129.53.203.139
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"177.239.175.192","externalIp":"166.225.233.1","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=177.239.175.192 ::: serverIP=166.225.233.1 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-18T01:51:20.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"177.239.175.192\",\"externalIp\":\"166.225.233.1\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:20.000Z\"} ::: clientIP=177.239.175.192 ::: serverIP=166.225.233.1 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "google-font.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "google-font.com",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "177.239.175.192",
"serverIP": "166.225.233.1",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"177.239.175.192","externalIp":"166.225.233.1","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=177.239.175.192 ::: serverIP=166.225.233.1 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"177.239.175.192","externalIp":"166.225.233.1","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=177.239.175.192 ::: serverIP=166.225.233.1 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-18T01:51:20.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: google-font.com
messagetype: firewall_action
severitycode: 2
fqdn: google-font.com
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 177.239.175.192
serverIP: 166.225.233.1
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"39.193.201.86","externalIp":"166.210.119.192","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=39.193.201.86 ::: serverIP=166.210.119.192 ::: userName=charlie ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-18T01:51:20.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"39.193.201.86\",\"externalIp\":\"166.210.119.192\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:20.000Z\"} ::: clientIP=39.193.201.86 ::: serverIP=166.210.119.192 ::: userName=charlie ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "google-font.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "google-font.com",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "39.193.201.86",
"serverIP": "166.210.119.192",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"39.193.201.86","externalIp":"166.210.119.192","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=39.193.201.86 ::: serverIP=166.210.119.192 ::: userName=charlie ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"39.193.201.86","externalIp":"166.210.119.192","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=39.193.201.86 ::: serverIP=166.210.119.192 ::: userName=charlie ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-18T01:51:20.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: google-font.com
messagetype: firewall_action
severitycode: 2
fqdn: google-font.com
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 39.193.201.86
serverIP: 166.210.119.192
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"34.49.172.183","externalIp":"121.73.78.106","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=34.49.172.183 ::: serverIP=121.73.78.106 ::: userName=johndoe ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-08T12:55:34.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"34.49.172.183\",\"externalIp\":\"121.73.78.106\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-08T12:55:34.000Z\"} ::: clientIP=34.49.172.183 ::: serverIP=121.73.78.106 ::: userName=johndoe ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "34.49.172.183",
"serverIP": "121.73.78.106",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"34.49.172.183","externalIp":"121.73.78.106","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=34.49.172.183 ::: serverIP=121.73.78.106 ::: userName=johndoe ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"34.49.172.183","externalIp":"121.73.78.106","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=34.49.172.183 ::: serverIP=121.73.78.106 ::: userName=johndoe ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-08T12:55:34.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 34.49.172.183
serverIP: 121.73.78.106
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"172.198.164.247","externalIp":"73.26.159.146","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=172.198.164.247 ::: serverIP=73.26.159.146 ::: userName=fish ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-08T12:55:34.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"172.198.164.247\",\"externalIp\":\"73.26.159.146\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-08T12:55:34.000Z\"} ::: clientIP=172.198.164.247 ::: serverIP=73.26.159.146 ::: userName=fish ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "172.198.164.247",
"serverIP": "73.26.159.146",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"172.198.164.247","externalIp":"73.26.159.146","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=172.198.164.247 ::: serverIP=73.26.159.146 ::: userName=fish ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"172.198.164.247","externalIp":"73.26.159.146","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=172.198.164.247 ::: serverIP=73.26.159.146 ::: userName=fish ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-08T12:55:34.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 172.198.164.247
serverIP: 73.26.159.146
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"169.129.194.54","externalIp":"44.37.25.195","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=169.129.194.54 ::: serverIP=44.37.25.195 ::: userName=charlie ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-18T01:51:20.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"169.129.194.54\",\"externalIp\":\"44.37.25.195\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:20.000Z\"} ::: clientIP=169.129.194.54 ::: serverIP=44.37.25.195 ::: userName=charlie ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "google-font.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "google-font.com",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "169.129.194.54",
"serverIP": "44.37.25.195",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"169.129.194.54","externalIp":"44.37.25.195","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=169.129.194.54 ::: serverIP=44.37.25.195 ::: userName=charlie ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"169.129.194.54","externalIp":"44.37.25.195","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=169.129.194.54 ::: serverIP=44.37.25.195 ::: userName=charlie ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-18T01:51:20.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: google-font.com
messagetype: firewall_action
severitycode: 2
fqdn: google-font.com
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 169.129.194.54
serverIP: 44.37.25.195
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"187.107.23.37","externalIp":"231.49.82.85","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=187.107.23.37 ::: serverIP=231.49.82.85 ::: userName=johndoe ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-18T01:51:20.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"187.107.23.37\",\"externalIp\":\"231.49.82.85\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:20.000Z\"} ::: clientIP=187.107.23.37 ::: serverIP=231.49.82.85 ::: userName=johndoe ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "google-font.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "google-font.com",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "187.107.23.37",
"serverIP": "231.49.82.85",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"187.107.23.37","externalIp":"231.49.82.85","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=187.107.23.37 ::: serverIP=231.49.82.85 ::: userName=johndoe ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"187.107.23.37","externalIp":"231.49.82.85","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=187.107.23.37 ::: serverIP=231.49.82.85 ::: userName=johndoe ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-18T01:51:20.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: google-font.com
messagetype: firewall_action
severitycode: 2
fqdn: google-font.com
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 187.107.23.37
serverIP: 231.49.82.85
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"203.142.245.203","externalIp":"191.178.98.164","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=203.142.245.203 ::: serverIP=191.178.98.164 ::: userName=johndoe ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-08T12:55:34.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"203.142.245.203\",\"externalIp\":\"191.178.98.164\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-08T12:55:34.000Z\"} ::: clientIP=203.142.245.203 ::: serverIP=191.178.98.164 ::: userName=johndoe ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "203.142.245.203",
"serverIP": "191.178.98.164",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"203.142.245.203","externalIp":"191.178.98.164","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=203.142.245.203 ::: serverIP=191.178.98.164 ::: userName=johndoe ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"203.142.245.203","externalIp":"191.178.98.164","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=203.142.245.203 ::: serverIP=191.178.98.164 ::: userName=johndoe ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-08T12:55:34.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 203.142.245.203
serverIP: 191.178.98.164
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"35.128.162.63","externalIp":"14.9.75.222","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=35.128.162.63 ::: serverIP=14.9.75.222 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-08T12:55:34.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"35.128.162.63\",\"externalIp\":\"14.9.75.222\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-08T12:55:34.000Z\"} ::: clientIP=35.128.162.63 ::: serverIP=14.9.75.222 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "35.128.162.63",
"serverIP": "14.9.75.222",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"35.128.162.63","externalIp":"14.9.75.222","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=35.128.162.63 ::: serverIP=14.9.75.222 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"35.128.162.63","externalIp":"14.9.75.222","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-08T12:55:34.000Z"} ::: clientIP=35.128.162.63 ::: serverIP=14.9.75.222 ::: userName=bob ::: created_at=2022-07-08T12:55:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-08T12:55:34.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-08T12:55:34.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 35.128.162.63
serverIP: 14.9.75.222
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"192.223.25.162","externalIp":"162.129.60.159","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=192.223.25.162 ::: serverIP=162.129.60.159 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T16:55:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"192.223.25.162\",\"externalIp\":\"162.129.60.159\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:15.000Z\"} ::: clientIP=192.223.25.162 ::: serverIP=162.129.60.159 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "192.223.25.162",
"serverIP": "162.129.60.159",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"192.223.25.162","externalIp":"162.129.60.159","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=192.223.25.162 ::: serverIP=162.129.60.159 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.