input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t11.22.121.83\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.22.121.83","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}}
{ "action": "Logon", "clientport": 47122, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T18:59:23.130Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T18:59:24.072Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t11.22.121.83\\n\\tSource Port:\\t\\t47122\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"11.22.121.83\",\"IpPort\":\"47122\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":15424}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669678884,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6669678884", "streamName": "microsoft-windows-security-auditing", "clientIP": "11.22.121.83", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t11.22.121.83\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.22.121.83","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t11.22.121.83\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.22.121.83","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 47122 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6669678884 streamName: microsoft-windows-security-auditing clientIP: 11.22.121.83 userName: $
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t69.24.155.31\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"69.24.155.31","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}}
{ "action": "Logon", "clientport": 47122, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T18:59:23.130Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T18:59:24.072Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t69.24.155.31\\n\\tSource Port:\\t\\t47122\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"69.24.155.31\",\"IpPort\":\"47122\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":15424}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669678884,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6669678884", "streamName": "microsoft-windows-security-auditing", "clientIP": "69.24.155.31", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t69.24.155.31\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"69.24.155.31","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t69.24.155.31\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"69.24.155.31","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 47122 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6669678884 streamName: microsoft-windows-security-auditing clientIP: 69.24.155.31 userName: $
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t110.159.30.255\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"110.159.30.255","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}}
{ "action": "Logon", "clientport": 47122, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T18:59:23.130Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T18:59:24.072Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t110.159.30.255\\n\\tSource Port:\\t\\t47122\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"110.159.30.255\",\"IpPort\":\"47122\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":15424}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669678884,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6669678884", "streamName": "microsoft-windows-security-auditing", "clientIP": "110.159.30.255", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t110.159.30.255\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"110.159.30.255","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t110.159.30.255\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"110.159.30.255","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 47122 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6669678884 streamName: microsoft-windows-security-auditing clientIP: 110.159.30.255 userName: $
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t29.1.41.241\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"29.1.41.241","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}}
{ "action": "Logon", "clientport": 47122, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T18:59:23.130Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T18:59:24.072Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t29.1.41.241\\n\\tSource Port:\\t\\t47122\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"29.1.41.241\",\"IpPort\":\"47122\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":15424}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669678884,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6669678884", "streamName": "microsoft-windows-security-auditing", "clientIP": "29.1.41.241", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t29.1.41.241\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"29.1.41.241","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t29.1.41.241\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"29.1.41.241","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 47122 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6669678884 streamName: microsoft-windows-security-auditing clientIP: 29.1.41.241 userName: $
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t101.57.148.76\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"101.57.148.76","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}}
{ "action": "Logon", "clientport": 49342, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T19:00:30.531Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T19:00:31.990Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t101.57.148.76\\n\\tSource Port:\\t\\t49342\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"101.57.148.76\",\"IpPort\":\"49342\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":15424}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669683298,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6669683298", "streamName": "microsoft-windows-security-auditing", "clientIP": "101.57.148.76", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t101.57.148.76\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"101.57.148.76","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t101.57.148.76\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"101.57.148.76","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 49342 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6669683298 streamName: microsoft-windows-security-auditing clientIP: 101.57.148.76 userName: $
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t234.15.153.112\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"234.15.153.112","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}}
{ "action": "Logon", "clientport": 49342, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T19:00:30.531Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T19:00:31.990Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t234.15.153.112\\n\\tSource Port:\\t\\t49342\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"234.15.153.112\",\"IpPort\":\"49342\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":15424}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669683298,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6669683298", "streamName": "microsoft-windows-security-auditing", "clientIP": "234.15.153.112", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t234.15.153.112\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"234.15.153.112","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t234.15.153.112\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"234.15.153.112","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 49342 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6669683298 streamName: microsoft-windows-security-auditing clientIP: 234.15.153.112 userName: $
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t9.214.13.50\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"9.214.13.50","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}}
{ "action": "Logon", "clientport": 49342, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T19:00:30.531Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T19:00:31.990Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t9.214.13.50\\n\\tSource Port:\\t\\t49342\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"9.214.13.50\",\"IpPort\":\"49342\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":15424}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669683298,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6669683298", "streamName": "microsoft-windows-security-auditing", "clientIP": "9.214.13.50", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t9.214.13.50\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"9.214.13.50","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t9.214.13.50\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"9.214.13.50","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 49342 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6669683298 streamName: microsoft-windows-security-auditing clientIP: 9.214.13.50 userName: $
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t33.220.48.28\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"33.220.48.28","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}}
{ "action": "Logon", "clientport": 49342, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T19:00:30.531Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T19:00:31.990Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t33.220.48.28\\n\\tSource Port:\\t\\t49342\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"33.220.48.28\",\"IpPort\":\"49342\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":15424}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669683298,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6669683298", "streamName": "microsoft-windows-security-auditing", "clientIP": "33.220.48.28", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t33.220.48.28\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"33.220.48.28","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t33.220.48.28\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"33.220.48.28","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 49342 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6669683298 streamName: microsoft-windows-security-auditing clientIP: 33.220.48.28 userName: $
Explain this syslog message
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"72.189.166.172","externalIp":"3.84.230.115","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=72.189.166.172 ::: serverIP=3.84.230.115 ::: userName=johndoe ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "tp.21ca3455c-frontier.bookdepository.com", "message": "WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"72.189.166.172\",\"externalIp\":\"3.84.230.115\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"tp.21ca3455c-frontier.bookdepository.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T16:43:03.000Z\"} ::: clientIP=72.189.166.172 ::: serverIP=3.84.230.115 ::: userName=johndoe ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "tp.21ca3455c-frontier.bookdepository.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-24T16:43:03.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping", "streamName": "OpenDNS Detection", "clientIP": "72.189.166.172", "serverIP": "3.84.230.115", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"72.189.166.172","externalIp":"3.84.230.115","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=72.189.166.172 ::: serverIP=3.84.230.115 ::: userName=johndoe ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"72.189.166.172","externalIp":"3.84.230.115","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=72.189.166.172 ::: serverIP=3.84.230.115 ::: userName=johndoe ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: tp.21ca3455c-frontier.bookdepository.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: tp.21ca3455c-frontier.bookdepository.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-24T16:43:03.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping streamName: OpenDNS Detection clientIP: 72.189.166.172 serverIP: 3.84.230.115 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"162.168.176.158","externalIp":"180.100.71.28","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=162.168.176.158 ::: serverIP=180.100.71.28 ::: userName=bob ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "tp.21ca3455c-frontier.bookdepository.com", "message": "WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"162.168.176.158\",\"externalIp\":\"180.100.71.28\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"tp.21ca3455c-frontier.bookdepository.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T16:43:03.000Z\"} ::: clientIP=162.168.176.158 ::: serverIP=180.100.71.28 ::: userName=bob ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "tp.21ca3455c-frontier.bookdepository.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-24T16:43:03.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping", "streamName": "OpenDNS Detection", "clientIP": "162.168.176.158", "serverIP": "180.100.71.28", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"162.168.176.158","externalIp":"180.100.71.28","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=162.168.176.158 ::: serverIP=180.100.71.28 ::: userName=bob ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"162.168.176.158","externalIp":"180.100.71.28","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=162.168.176.158 ::: serverIP=180.100.71.28 ::: userName=bob ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: tp.21ca3455c-frontier.bookdepository.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: tp.21ca3455c-frontier.bookdepository.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-24T16:43:03.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping streamName: OpenDNS Detection clientIP: 162.168.176.158 serverIP: 180.100.71.28 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"208.142.125.204","externalIp":"181.230.138.123","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=208.142.125.204 ::: serverIP=181.230.138.123 ::: userName=charlie ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "tp.21ca3455c-frontier.bookdepository.com", "message": "WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"208.142.125.204\",\"externalIp\":\"181.230.138.123\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"tp.21ca3455c-frontier.bookdepository.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T16:43:03.000Z\"} ::: clientIP=208.142.125.204 ::: serverIP=181.230.138.123 ::: userName=charlie ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "tp.21ca3455c-frontier.bookdepository.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-24T16:43:03.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping", "streamName": "OpenDNS Detection", "clientIP": "208.142.125.204", "serverIP": "181.230.138.123", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"208.142.125.204","externalIp":"181.230.138.123","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=208.142.125.204 ::: serverIP=181.230.138.123 ::: userName=charlie ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"208.142.125.204","externalIp":"181.230.138.123","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=208.142.125.204 ::: serverIP=181.230.138.123 ::: userName=charlie ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: tp.21ca3455c-frontier.bookdepository.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: tp.21ca3455c-frontier.bookdepository.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-24T16:43:03.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping streamName: OpenDNS Detection clientIP: 208.142.125.204 serverIP: 181.230.138.123 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"71.239.55.65","externalIp":"0.241.103.36","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=71.239.55.65 ::: serverIP=0.241.103.36 ::: userName=charlie ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "tp.21ca3455c-frontier.bookdepository.com", "message": "WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"71.239.55.65\",\"externalIp\":\"0.241.103.36\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"tp.21ca3455c-frontier.bookdepository.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T16:43:03.000Z\"} ::: clientIP=71.239.55.65 ::: serverIP=0.241.103.36 ::: userName=charlie ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "tp.21ca3455c-frontier.bookdepository.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-24T16:43:03.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping", "streamName": "OpenDNS Detection", "clientIP": "71.239.55.65", "serverIP": "0.241.103.36", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"71.239.55.65","externalIp":"0.241.103.36","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=71.239.55.65 ::: serverIP=0.241.103.36 ::: userName=charlie ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"71.239.55.65","externalIp":"0.241.103.36","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=71.239.55.65 ::: serverIP=0.241.103.36 ::: userName=charlie ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: tp.21ca3455c-frontier.bookdepository.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: tp.21ca3455c-frontier.bookdepository.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-24T16:43:03.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping streamName: OpenDNS Detection clientIP: 71.239.55.65 serverIP: 0.241.103.36 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.vipleague.lc ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"24.244.129.234","externalIp":"158.102.241.77","categories":["Potentially Harmful","Illegal Downloads"],"tags":[],"destination":"www.vipleague.lc","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T19:08:18.000Z"} ::: clientIP=24.244.129.234 ::: serverIP=158.102.241.77 ::: userName=janedoe ::: created_at=2023-03-24T19:08:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulIllegal Downloads ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T19:08:18.000Z ::: serverHostname=www.vipleague.lc ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "www.vipleague.lc", "message": "WitFoo-Artifact ::: fqdn=www.vipleague.lc ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"24.244.129.234\",\"externalIp\":\"158.102.241.77\",\"categories\":[\"Potentially Harmful\",\"Illegal Downloads\"],\"tags\":[],\"destination\":\"www.vipleague.lc\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T19:08:18.000Z\"} ::: clientIP=24.244.129.234 ::: serverIP=158.102.241.77 ::: userName=janedoe ::: created_at=2023-03-24T19:08:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulIllegal Downloads ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T19:08:18.000Z ::: serverHostname=www.vipleague.lc ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "www.vipleague.lc", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-24T19:08:18.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Potentially HarmfulIllegal Downloads", "streamName": "OpenDNS Detection", "clientIP": "24.244.129.234", "serverIP": "158.102.241.77", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.vipleague.lc ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"24.244.129.234","externalIp":"158.102.241.77","categories":["Potentially Harmful","Illegal Downloads"],"tags":[],"destination":"www.vipleague.lc","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T19:08:18.000Z"} ::: clientIP=24.244.129.234 ::: serverIP=158.102.241.77 ::: userName=janedoe ::: created_at=2023-03-24T19:08:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulIllegal Downloads ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T19:08:18.000Z ::: serverHostname=www.vipleague.lc ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.vipleague.lc ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"24.244.129.234","externalIp":"158.102.241.77","categories":["Potentially Harmful","Illegal Downloads"],"tags":[],"destination":"www.vipleague.lc","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T19:08:18.000Z"} ::: clientIP=24.244.129.234 ::: serverIP=158.102.241.77 ::: userName=janedoe ::: created_at=2023-03-24T19:08:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulIllegal Downloads ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T19:08:18.000Z ::: serverHostname=www.vipleague.lc ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: www.vipleague.lc messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: www.vipleague.lc severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-24T19:08:18.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Potentially HarmfulIllegal Downloads streamName: OpenDNS Detection clientIP: 24.244.129.234 serverIP: 158.102.241.77 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.vipleague.lc ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"223.9.242.104","externalIp":"104.5.251.123","categories":["Potentially Harmful","Illegal Downloads"],"tags":[],"destination":"www.vipleague.lc","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T19:08:18.000Z"} ::: clientIP=223.9.242.104 ::: serverIP=104.5.251.123 ::: userName=janedoe ::: created_at=2023-03-24T19:08:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulIllegal Downloads ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T19:08:18.000Z ::: serverHostname=www.vipleague.lc ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "www.vipleague.lc", "message": "WitFoo-Artifact ::: fqdn=www.vipleague.lc ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"223.9.242.104\",\"externalIp\":\"104.5.251.123\",\"categories\":[\"Potentially Harmful\",\"Illegal Downloads\"],\"tags\":[],\"destination\":\"www.vipleague.lc\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T19:08:18.000Z\"} ::: clientIP=223.9.242.104 ::: serverIP=104.5.251.123 ::: userName=janedoe ::: created_at=2023-03-24T19:08:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulIllegal Downloads ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T19:08:18.000Z ::: serverHostname=www.vipleague.lc ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "www.vipleague.lc", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-24T19:08:18.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Potentially HarmfulIllegal Downloads", "streamName": "OpenDNS Detection", "clientIP": "223.9.242.104", "serverIP": "104.5.251.123", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.vipleague.lc ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"223.9.242.104","externalIp":"104.5.251.123","categories":["Potentially Harmful","Illegal Downloads"],"tags":[],"destination":"www.vipleague.lc","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T19:08:18.000Z"} ::: clientIP=223.9.242.104 ::: serverIP=104.5.251.123 ::: userName=janedoe ::: created_at=2023-03-24T19:08:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulIllegal Downloads ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T19:08:18.000Z ::: serverHostname=www.vipleague.lc ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.vipleague.lc ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"223.9.242.104","externalIp":"104.5.251.123","categories":["Potentially Harmful","Illegal Downloads"],"tags":[],"destination":"www.vipleague.lc","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T19:08:18.000Z"} ::: clientIP=223.9.242.104 ::: serverIP=104.5.251.123 ::: userName=janedoe ::: created_at=2023-03-24T19:08:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulIllegal Downloads ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T19:08:18.000Z ::: serverHostname=www.vipleague.lc ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: www.vipleague.lc messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: www.vipleague.lc severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-24T19:08:18.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Potentially HarmfulIllegal Downloads streamName: OpenDNS Detection clientIP: 223.9.242.104 serverIP: 104.5.251.123 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"51.54.163.181","externalIp":"206.182.203.58","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=51.54.163.181 ::: serverIP=206.182.203.58 ::: userName=bob ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "tp.21ca3455c-frontier.bookdepository.com", "message": "WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"51.54.163.181\",\"externalIp\":\"206.182.203.58\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"tp.21ca3455c-frontier.bookdepository.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T16:43:03.000Z\"} ::: clientIP=51.54.163.181 ::: serverIP=206.182.203.58 ::: userName=bob ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "tp.21ca3455c-frontier.bookdepository.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-24T16:43:03.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping", "streamName": "OpenDNS Detection", "clientIP": "51.54.163.181", "serverIP": "206.182.203.58", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"51.54.163.181","externalIp":"206.182.203.58","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=51.54.163.181 ::: serverIP=206.182.203.58 ::: userName=bob ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"51.54.163.181","externalIp":"206.182.203.58","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=51.54.163.181 ::: serverIP=206.182.203.58 ::: userName=bob ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: tp.21ca3455c-frontier.bookdepository.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: tp.21ca3455c-frontier.bookdepository.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-24T16:43:03.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping streamName: OpenDNS Detection clientIP: 51.54.163.181 serverIP: 206.182.203.58 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"165.54.124.106","externalIp":"110.161.48.119","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=165.54.124.106 ::: serverIP=110.161.48.119 ::: userName=johndoe ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "tp.21ca3455c-frontier.bookdepository.com", "message": "WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"165.54.124.106\",\"externalIp\":\"110.161.48.119\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"tp.21ca3455c-frontier.bookdepository.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T16:43:03.000Z\"} ::: clientIP=165.54.124.106 ::: serverIP=110.161.48.119 ::: userName=johndoe ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "tp.21ca3455c-frontier.bookdepository.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-24T16:43:03.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping", "streamName": "OpenDNS Detection", "clientIP": "165.54.124.106", "serverIP": "110.161.48.119", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"165.54.124.106","externalIp":"110.161.48.119","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=165.54.124.106 ::: serverIP=110.161.48.119 ::: userName=johndoe ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"165.54.124.106","externalIp":"110.161.48.119","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=165.54.124.106 ::: serverIP=110.161.48.119 ::: userName=johndoe ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: tp.21ca3455c-frontier.bookdepository.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: tp.21ca3455c-frontier.bookdepository.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-24T16:43:03.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping streamName: OpenDNS Detection clientIP: 165.54.124.106 serverIP: 110.161.48.119 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"19.160.138.39","externalIp":"19.160.138.39","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=19.160.138.39 ::: serverIP=19.160.138.39 ::: userName=alice ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "www.ticolugar.com", "message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"19.160.138.39\",\"externalIp\":\"19.160.138.39\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T06:11:22.000Z\"} ::: clientIP=19.160.138.39 ::: serverIP=19.160.138.39 ::: userName=alice ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "www.ticolugar.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-01-16T06:11:22.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareReal Estate", "streamName": "OpenDNS Detection", "clientIP": "19.160.138.39", "serverIP": "51.211.46.244", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"19.160.138.39","externalIp":"19.160.138.39","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=19.160.138.39 ::: serverIP=19.160.138.39 ::: userName=alice ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"19.160.138.39","externalIp":"19.160.138.39","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=19.160.138.39 ::: serverIP=19.160.138.39 ::: userName=alice ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: www.ticolugar.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: www.ticolugar.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-01-16T06:11:22.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareReal Estate streamName: OpenDNS Detection clientIP: 19.160.138.39 serverIP: 51.211.46.244 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"94.6.228.186","externalIp":"94.6.228.186","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=94.6.228.186 ::: serverIP=94.6.228.186 ::: userName=charlie ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "www.ticolugar.com", "message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"94.6.228.186\",\"externalIp\":\"94.6.228.186\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T06:11:22.000Z\"} ::: clientIP=94.6.228.186 ::: serverIP=94.6.228.186 ::: userName=charlie ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "www.ticolugar.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-01-16T06:11:22.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareReal Estate", "streamName": "OpenDNS Detection", "clientIP": "94.6.228.186", "serverIP": "157.1.70.92", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"94.6.228.186","externalIp":"94.6.228.186","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=94.6.228.186 ::: serverIP=94.6.228.186 ::: userName=charlie ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"94.6.228.186","externalIp":"94.6.228.186","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=94.6.228.186 ::: serverIP=94.6.228.186 ::: userName=charlie ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: www.ticolugar.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: www.ticolugar.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-01-16T06:11:22.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareReal Estate streamName: OpenDNS Detection clientIP: 94.6.228.186 serverIP: 157.1.70.92 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"146.90.160.10","externalIp":"146.90.160.10","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=146.90.160.10 ::: serverIP=146.90.160.10 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"146.90.160.10\",\"externalIp\":\"146.90.160.10\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=146.90.160.10 ::: serverIP=146.90.160.10 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-11-02T11:55:45.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareEntertainment", "streamName": "OpenDNS Detection", "clientIP": "146.90.160.10", "serverIP": "42.125.162.162", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"146.90.160.10","externalIp":"146.90.160.10","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=146.90.160.10 ::: serverIP=146.90.160.10 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"146.90.160.10","externalIp":"146.90.160.10","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=146.90.160.10 ::: serverIP=146.90.160.10 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-11-02T11:55:45.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareEntertainment streamName: OpenDNS Detection clientIP: 146.90.160.10 serverIP: 42.125.162.162 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"226.15.142.34","externalIp":"226.15.142.34","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=226.15.142.34 ::: serverIP=226.15.142.34 ::: userName=janedoe ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"226.15.142.34\",\"externalIp\":\"226.15.142.34\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=226.15.142.34 ::: serverIP=226.15.142.34 ::: userName=janedoe ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-11-02T11:55:45.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareEntertainment", "streamName": "OpenDNS Detection", "clientIP": "226.15.142.34", "serverIP": "113.79.127.136", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"226.15.142.34","externalIp":"226.15.142.34","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=226.15.142.34 ::: serverIP=226.15.142.34 ::: userName=janedoe ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"226.15.142.34","externalIp":"226.15.142.34","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=226.15.142.34 ::: serverIP=226.15.142.34 ::: userName=janedoe ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-11-02T11:55:45.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareEntertainment streamName: OpenDNS Detection clientIP: 226.15.142.34 serverIP: 113.79.127.136 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"155.0.19.143","externalIp":"155.0.19.143","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=155.0.19.143 ::: serverIP=155.0.19.143 ::: userName=janedoe ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "www.ticolugar.com", "message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"155.0.19.143\",\"externalIp\":\"155.0.19.143\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T06:11:22.000Z\"} ::: clientIP=155.0.19.143 ::: serverIP=155.0.19.143 ::: userName=janedoe ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "www.ticolugar.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-01-16T06:11:22.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareReal Estate", "streamName": "OpenDNS Detection", "clientIP": "155.0.19.143", "serverIP": "44.93.118.88", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"155.0.19.143","externalIp":"155.0.19.143","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=155.0.19.143 ::: serverIP=155.0.19.143 ::: userName=janedoe ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"155.0.19.143","externalIp":"155.0.19.143","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=155.0.19.143 ::: serverIP=155.0.19.143 ::: userName=janedoe ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: www.ticolugar.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: www.ticolugar.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-01-16T06:11:22.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareReal Estate streamName: OpenDNS Detection clientIP: 155.0.19.143 serverIP: 44.93.118.88 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"189.158.13.218","externalIp":"189.158.13.218","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=189.158.13.218 ::: serverIP=189.158.13.218 ::: userName=fish ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "www.ticolugar.com", "message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"189.158.13.218\",\"externalIp\":\"189.158.13.218\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T06:11:22.000Z\"} ::: clientIP=189.158.13.218 ::: serverIP=189.158.13.218 ::: userName=fish ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "www.ticolugar.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-01-16T06:11:22.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareReal Estate", "streamName": "OpenDNS Detection", "clientIP": "189.158.13.218", "serverIP": "19.118.83.117", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"189.158.13.218","externalIp":"189.158.13.218","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=189.158.13.218 ::: serverIP=189.158.13.218 ::: userName=fish ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"189.158.13.218","externalIp":"189.158.13.218","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=189.158.13.218 ::: serverIP=189.158.13.218 ::: userName=fish ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: www.ticolugar.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: www.ticolugar.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-01-16T06:11:22.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareReal Estate streamName: OpenDNS Detection clientIP: 189.158.13.218 serverIP: 19.118.83.117 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"68.229.186.99","externalIp":"68.229.186.99","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=68.229.186.99 ::: serverIP=68.229.186.99 ::: userName=bob ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "www.ticolugar.com", "message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"68.229.186.99\",\"externalIp\":\"68.229.186.99\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T06:11:22.000Z\"} ::: clientIP=68.229.186.99 ::: serverIP=68.229.186.99 ::: userName=bob ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "www.ticolugar.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-01-16T06:11:22.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareReal Estate", "streamName": "OpenDNS Detection", "clientIP": "68.229.186.99", "serverIP": "177.177.203.41", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"68.229.186.99","externalIp":"68.229.186.99","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=68.229.186.99 ::: serverIP=68.229.186.99 ::: userName=bob ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"68.229.186.99","externalIp":"68.229.186.99","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=68.229.186.99 ::: serverIP=68.229.186.99 ::: userName=bob ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: www.ticolugar.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: www.ticolugar.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-01-16T06:11:22.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareReal Estate streamName: OpenDNS Detection clientIP: 68.229.186.99 serverIP: 177.177.203.41 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"54.82.24.165","externalIp":"54.82.24.165","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=54.82.24.165 ::: serverIP=54.82.24.165 ::: userName=fish ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "www.ticolugar.com", "message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"54.82.24.165\",\"externalIp\":\"54.82.24.165\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T06:11:22.000Z\"} ::: clientIP=54.82.24.165 ::: serverIP=54.82.24.165 ::: userName=fish ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "www.ticolugar.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-01-16T06:11:22.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareReal Estate", "streamName": "OpenDNS Detection", "clientIP": "54.82.24.165", "serverIP": "45.57.37.88", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"54.82.24.165","externalIp":"54.82.24.165","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=54.82.24.165 ::: serverIP=54.82.24.165 ::: userName=fish ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"54.82.24.165","externalIp":"54.82.24.165","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=54.82.24.165 ::: serverIP=54.82.24.165 ::: userName=fish ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: www.ticolugar.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: www.ticolugar.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-01-16T06:11:22.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareReal Estate streamName: OpenDNS Detection clientIP: 54.82.24.165 serverIP: 45.57.37.88 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"70.225.135.181","externalIp":"70.225.135.181","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=70.225.135.181 ::: serverIP=70.225.135.181 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"70.225.135.181\",\"externalIp\":\"70.225.135.181\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=70.225.135.181 ::: serverIP=70.225.135.181 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-11-02T11:55:45.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareEntertainment", "streamName": "OpenDNS Detection", "clientIP": "70.225.135.181", "serverIP": "105.210.11.248", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"70.225.135.181","externalIp":"70.225.135.181","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=70.225.135.181 ::: serverIP=70.225.135.181 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"70.225.135.181","externalIp":"70.225.135.181","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=70.225.135.181 ::: serverIP=70.225.135.181 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-11-02T11:55:45.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareEntertainment streamName: OpenDNS Detection clientIP: 70.225.135.181 serverIP: 105.210.11.248 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"239.240.203.247","externalIp":"239.240.203.247","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=239.240.203.247 ::: serverIP=239.240.203.247 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"239.240.203.247\",\"externalIp\":\"239.240.203.247\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=239.240.203.247 ::: serverIP=239.240.203.247 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-11-02T11:55:45.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareEntertainment", "streamName": "OpenDNS Detection", "clientIP": "239.240.203.247", "serverIP": "57.159.31.108", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"239.240.203.247","externalIp":"239.240.203.247","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=239.240.203.247 ::: serverIP=239.240.203.247 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"239.240.203.247","externalIp":"239.240.203.247","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=239.240.203.247 ::: serverIP=239.240.203.247 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-11-02T11:55:45.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareEntertainment streamName: OpenDNS Detection clientIP: 239.240.203.247 serverIP: 57.159.31.108 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"150.219.156.142","externalIp":"150.219.156.142","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=150.219.156.142 ::: serverIP=150.219.156.142 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"150.219.156.142\",\"externalIp\":\"150.219.156.142\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=150.219.156.142 ::: serverIP=150.219.156.142 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-11-02T11:55:45.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareEntertainment", "streamName": "OpenDNS Detection", "clientIP": "150.219.156.142", "serverIP": "6.218.199.13", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"150.219.156.142","externalIp":"150.219.156.142","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=150.219.156.142 ::: serverIP=150.219.156.142 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"150.219.156.142","externalIp":"150.219.156.142","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=150.219.156.142 ::: serverIP=150.219.156.142 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-11-02T11:55:45.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareEntertainment streamName: OpenDNS Detection clientIP: 150.219.156.142 serverIP: 6.218.199.13 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"94.54.245.3","externalIp":"94.54.245.3","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=94.54.245.3 ::: serverIP=94.54.245.3 ::: userName=fish ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"94.54.245.3\",\"externalIp\":\"94.54.245.3\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=94.54.245.3 ::: serverIP=94.54.245.3 ::: userName=fish ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-11-02T11:55:45.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareEntertainment", "streamName": "OpenDNS Detection", "clientIP": "94.54.245.3", "serverIP": "150.148.248.4", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"94.54.245.3","externalIp":"94.54.245.3","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=94.54.245.3 ::: serverIP=94.54.245.3 ::: userName=fish ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"94.54.245.3","externalIp":"94.54.245.3","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=94.54.245.3 ::: serverIP=94.54.245.3 ::: userName=fish ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-11-02T11:55:45.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareEntertainment streamName: OpenDNS Detection clientIP: 94.54.245.3 serverIP: 150.148.248.4 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"157.187.12.125","externalIp":"131.53.253.246","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=157.187.12.125 ::: serverIP=131.53.253.246 ::: userName=alice ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "genzfeeds.com", "message": "WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"157.187.12.125\",\"externalIp\":\"131.53.253.246\",\"categories\":[\"Forums/Message boards\",\"Phishing\",\"Online Communities\"],\"tags\":[],\"destination\":\"genzfeeds.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-03T14:04:10.000Z\"} ::: clientIP=157.187.12.125 ::: serverIP=131.53.253.246 ::: userName=alice ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "genzfeeds.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-03T14:04:10.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Forums/Message boardsPhishingOnline Communities", "streamName": "OpenDNS Detection", "clientIP": "157.187.12.125", "serverIP": "131.53.253.246", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"157.187.12.125","externalIp":"131.53.253.246","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=157.187.12.125 ::: serverIP=131.53.253.246 ::: userName=alice ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"157.187.12.125","externalIp":"131.53.253.246","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=157.187.12.125 ::: serverIP=131.53.253.246 ::: userName=alice ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: genzfeeds.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: genzfeeds.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-03T14:04:10.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Forums/Message boardsPhishingOnline Communities streamName: OpenDNS Detection clientIP: 157.187.12.125 serverIP: 131.53.253.246 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"131.5.229.200","externalIp":"148.227.40.148","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=131.5.229.200 ::: serverIP=148.227.40.148 ::: userName=bob ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "genzfeeds.com", "message": "WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"131.5.229.200\",\"externalIp\":\"148.227.40.148\",\"categories\":[\"Forums/Message boards\",\"Phishing\",\"Online Communities\"],\"tags\":[],\"destination\":\"genzfeeds.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-03T14:04:10.000Z\"} ::: clientIP=131.5.229.200 ::: serverIP=148.227.40.148 ::: userName=bob ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "genzfeeds.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-03T14:04:10.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Forums/Message boardsPhishingOnline Communities", "streamName": "OpenDNS Detection", "clientIP": "131.5.229.200", "serverIP": "148.227.40.148", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"131.5.229.200","externalIp":"148.227.40.148","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=131.5.229.200 ::: serverIP=148.227.40.148 ::: userName=bob ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"131.5.229.200","externalIp":"148.227.40.148","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=131.5.229.200 ::: serverIP=148.227.40.148 ::: userName=bob ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: genzfeeds.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: genzfeeds.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-03T14:04:10.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Forums/Message boardsPhishingOnline Communities streamName: OpenDNS Detection clientIP: 131.5.229.200 serverIP: 148.227.40.148 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"73.141.2.61","externalIp":"75.198.228.11","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=73.141.2.61 ::: serverIP=75.198.228.11 ::: userName=janedoe ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "genzfeeds.com", "message": "WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"73.141.2.61\",\"externalIp\":\"75.198.228.11\",\"categories\":[\"Forums/Message boards\",\"Phishing\",\"Online Communities\"],\"tags\":[],\"destination\":\"genzfeeds.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-03T14:04:10.000Z\"} ::: clientIP=73.141.2.61 ::: serverIP=75.198.228.11 ::: userName=janedoe ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "genzfeeds.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-03T14:04:10.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Forums/Message boardsPhishingOnline Communities", "streamName": "OpenDNS Detection", "clientIP": "73.141.2.61", "serverIP": "75.198.228.11", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"73.141.2.61","externalIp":"75.198.228.11","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=73.141.2.61 ::: serverIP=75.198.228.11 ::: userName=janedoe ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"73.141.2.61","externalIp":"75.198.228.11","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=73.141.2.61 ::: serverIP=75.198.228.11 ::: userName=janedoe ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: genzfeeds.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: genzfeeds.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-03T14:04:10.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Forums/Message boardsPhishingOnline Communities streamName: OpenDNS Detection clientIP: 73.141.2.61 serverIP: 75.198.228.11 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"126.214.115.78","externalIp":"27.92.132.5","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=126.214.115.78 ::: serverIP=27.92.132.5 ::: userName=charlie ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "genzfeeds.com", "message": "WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"126.214.115.78\",\"externalIp\":\"27.92.132.5\",\"categories\":[\"Forums/Message boards\",\"Phishing\",\"Online Communities\"],\"tags\":[],\"destination\":\"genzfeeds.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-03T14:04:10.000Z\"} ::: clientIP=126.214.115.78 ::: serverIP=27.92.132.5 ::: userName=charlie ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "genzfeeds.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-03T14:04:10.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Forums/Message boardsPhishingOnline Communities", "streamName": "OpenDNS Detection", "clientIP": "126.214.115.78", "serverIP": "27.92.132.5", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"126.214.115.78","externalIp":"27.92.132.5","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=126.214.115.78 ::: serverIP=27.92.132.5 ::: userName=charlie ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"126.214.115.78","externalIp":"27.92.132.5","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=126.214.115.78 ::: serverIP=27.92.132.5 ::: userName=charlie ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: genzfeeds.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: genzfeeds.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-03T14:04:10.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Forums/Message boardsPhishingOnline Communities streamName: OpenDNS Detection clientIP: 126.214.115.78 serverIP: 27.92.132.5 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"88.23.136.15","externalIp":"6.35.188.22","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=88.23.136.15 ::: serverIP=6.35.188.22 ::: userName=nighthawk ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "genzfeeds.com", "message": "WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"88.23.136.15\",\"externalIp\":\"6.35.188.22\",\"categories\":[\"Forums/Message boards\",\"Phishing\",\"Online Communities\"],\"tags\":[],\"destination\":\"genzfeeds.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-03T14:04:10.000Z\"} ::: clientIP=88.23.136.15 ::: serverIP=6.35.188.22 ::: userName=nighthawk ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "genzfeeds.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-03T14:04:10.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Forums/Message boardsPhishingOnline Communities", "streamName": "OpenDNS Detection", "clientIP": "88.23.136.15", "serverIP": "6.35.188.22", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"88.23.136.15","externalIp":"6.35.188.22","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=88.23.136.15 ::: serverIP=6.35.188.22 ::: userName=nighthawk ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"88.23.136.15","externalIp":"6.35.188.22","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=88.23.136.15 ::: serverIP=6.35.188.22 ::: userName=nighthawk ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: genzfeeds.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: genzfeeds.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-03T14:04:10.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Forums/Message boardsPhishingOnline Communities streamName: OpenDNS Detection clientIP: 88.23.136.15 serverIP: 6.35.188.22 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"5.109.80.145","externalIp":"29.103.123.36","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=5.109.80.145 ::: serverIP=29.103.123.36 ::: userName=fish ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "genzfeeds.com", "message": "WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"5.109.80.145\",\"externalIp\":\"29.103.123.36\",\"categories\":[\"Forums/Message boards\",\"Phishing\",\"Online Communities\"],\"tags\":[],\"destination\":\"genzfeeds.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-03T14:04:10.000Z\"} ::: clientIP=5.109.80.145 ::: serverIP=29.103.123.36 ::: userName=fish ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "genzfeeds.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-03T14:04:10.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Forums/Message boardsPhishingOnline Communities", "streamName": "OpenDNS Detection", "clientIP": "5.109.80.145", "serverIP": "29.103.123.36", "userName": "fish" }
Create a JSON artifact from the message