input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t11.22.121.83\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.22.121.83","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}} | {
"action": "Logon",
"clientport": 47122,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T18:59:23.130Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T18:59:24.072Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t11.22.121.83\\n\\tSource Port:\\t\\t47122\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"11.22.121.83\",\"IpPort\":\"47122\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":15424}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669678884,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6669678884",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "11.22.121.83",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t11.22.121.83\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.22.121.83","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t11.22.121.83\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"11.22.121.83","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 47122
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6669678884
streamName: microsoft-windows-security-auditing
clientIP: 11.22.121.83
userName: $ | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t69.24.155.31\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"69.24.155.31","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}} | {
"action": "Logon",
"clientport": 47122,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T18:59:23.130Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T18:59:24.072Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t69.24.155.31\\n\\tSource Port:\\t\\t47122\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"69.24.155.31\",\"IpPort\":\"47122\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":15424}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669678884,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6669678884",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "69.24.155.31",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t69.24.155.31\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"69.24.155.31","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t69.24.155.31\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"69.24.155.31","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 47122
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6669678884
streamName: microsoft-windows-security-auditing
clientIP: 69.24.155.31
userName: $ | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t110.159.30.255\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"110.159.30.255","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}} | {
"action": "Logon",
"clientport": 47122,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T18:59:23.130Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T18:59:24.072Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t110.159.30.255\\n\\tSource Port:\\t\\t47122\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"110.159.30.255\",\"IpPort\":\"47122\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":15424}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669678884,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6669678884",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "110.159.30.255",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t110.159.30.255\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"110.159.30.255","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t110.159.30.255\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"110.159.30.255","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 47122
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6669678884
streamName: microsoft-windows-security-auditing
clientIP: 110.159.30.255
userName: $ | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t29.1.41.241\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"29.1.41.241","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}} | {
"action": "Logon",
"clientport": 47122,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T18:59:23.130Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T18:59:24.072Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t29.1.41.241\\n\\tSource Port:\\t\\t47122\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"29.1.41.241\",\"IpPort\":\"47122\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":15424}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669678884,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6669678884",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "29.1.41.241",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t29.1.41.241\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"29.1.41.241","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:59:23.130Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:59:24.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t29.1.41.241\n\tSource Port:\t\t47122\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"29.1.41.241","IpPort":"47122","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669678884,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 47122
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6669678884
streamName: microsoft-windows-security-auditing
clientIP: 29.1.41.241
userName: $ | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t101.57.148.76\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"101.57.148.76","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}} | {
"action": "Logon",
"clientport": 49342,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T19:00:30.531Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T19:00:31.990Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t101.57.148.76\\n\\tSource Port:\\t\\t49342\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"101.57.148.76\",\"IpPort\":\"49342\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":15424}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669683298,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6669683298",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "101.57.148.76",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t101.57.148.76\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"101.57.148.76","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t101.57.148.76\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"101.57.148.76","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 49342
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6669683298
streamName: microsoft-windows-security-auditing
clientIP: 101.57.148.76
userName: $ | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t234.15.153.112\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"234.15.153.112","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}} | {
"action": "Logon",
"clientport": 49342,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T19:00:30.531Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T19:00:31.990Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t234.15.153.112\\n\\tSource Port:\\t\\t49342\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"234.15.153.112\",\"IpPort\":\"49342\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":15424}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669683298,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6669683298",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "234.15.153.112",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t234.15.153.112\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"234.15.153.112","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t234.15.153.112\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"234.15.153.112","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 49342
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6669683298
streamName: microsoft-windows-security-auditing
clientIP: 234.15.153.112
userName: $ | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t9.214.13.50\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"9.214.13.50","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}} | {
"action": "Logon",
"clientport": 49342,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T19:00:30.531Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T19:00:31.990Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t9.214.13.50\\n\\tSource Port:\\t\\t49342\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"9.214.13.50\",\"IpPort\":\"49342\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":15424}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669683298,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6669683298",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "9.214.13.50",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t9.214.13.50\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"9.214.13.50","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t9.214.13.50\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"9.214.13.50","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 49342
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6669683298
streamName: microsoft-windows-security-auditing
clientIP: 9.214.13.50
userName: $ | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t33.220.48.28\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"33.220.48.28","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}} | {
"action": "Logon",
"clientport": 49342,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T19:00:30.531Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T19:00:31.990Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t33.220.48.28\\n\\tSource Port:\\t\\t49342\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"33.220.48.28\",\"IpPort\":\"49342\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":15424}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669683298,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6669683298",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "33.220.48.28",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t33.220.48.28\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"33.220.48.28","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T19:00:30.531Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T19:00:31.990Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t33.220.48.28\n\tSource Port:\t\t49342\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"33.220.48.28","IpPort":"49342","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":15424}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669683298,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 49342
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6669683298
streamName: microsoft-windows-security-auditing
clientIP: 33.220.48.28
userName: $ | Explain this syslog message |
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"72.189.166.172","externalIp":"3.84.230.115","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=72.189.166.172 ::: serverIP=3.84.230.115 ::: userName=johndoe ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "tp.21ca3455c-frontier.bookdepository.com",
"message": "WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"72.189.166.172\",\"externalIp\":\"3.84.230.115\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"tp.21ca3455c-frontier.bookdepository.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T16:43:03.000Z\"} ::: clientIP=72.189.166.172 ::: serverIP=3.84.230.115 ::: userName=johndoe ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "tp.21ca3455c-frontier.bookdepository.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-24T16:43:03.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"streamName": "OpenDNS Detection",
"clientIP": "72.189.166.172",
"serverIP": "3.84.230.115",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"72.189.166.172","externalIp":"3.84.230.115","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=72.189.166.172 ::: serverIP=3.84.230.115 ::: userName=johndoe ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"72.189.166.172","externalIp":"3.84.230.115","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=72.189.166.172 ::: serverIP=3.84.230.115 ::: userName=johndoe ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: tp.21ca3455c-frontier.bookdepository.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: tp.21ca3455c-frontier.bookdepository.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-24T16:43:03.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
streamName: OpenDNS Detection
clientIP: 72.189.166.172
serverIP: 3.84.230.115
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"162.168.176.158","externalIp":"180.100.71.28","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=162.168.176.158 ::: serverIP=180.100.71.28 ::: userName=bob ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "tp.21ca3455c-frontier.bookdepository.com",
"message": "WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"162.168.176.158\",\"externalIp\":\"180.100.71.28\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"tp.21ca3455c-frontier.bookdepository.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T16:43:03.000Z\"} ::: clientIP=162.168.176.158 ::: serverIP=180.100.71.28 ::: userName=bob ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "tp.21ca3455c-frontier.bookdepository.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-24T16:43:03.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"streamName": "OpenDNS Detection",
"clientIP": "162.168.176.158",
"serverIP": "180.100.71.28",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"162.168.176.158","externalIp":"180.100.71.28","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=162.168.176.158 ::: serverIP=180.100.71.28 ::: userName=bob ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"162.168.176.158","externalIp":"180.100.71.28","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=162.168.176.158 ::: serverIP=180.100.71.28 ::: userName=bob ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: tp.21ca3455c-frontier.bookdepository.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: tp.21ca3455c-frontier.bookdepository.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-24T16:43:03.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
streamName: OpenDNS Detection
clientIP: 162.168.176.158
serverIP: 180.100.71.28
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"208.142.125.204","externalIp":"181.230.138.123","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=208.142.125.204 ::: serverIP=181.230.138.123 ::: userName=charlie ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "tp.21ca3455c-frontier.bookdepository.com",
"message": "WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"208.142.125.204\",\"externalIp\":\"181.230.138.123\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"tp.21ca3455c-frontier.bookdepository.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T16:43:03.000Z\"} ::: clientIP=208.142.125.204 ::: serverIP=181.230.138.123 ::: userName=charlie ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "tp.21ca3455c-frontier.bookdepository.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-24T16:43:03.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"streamName": "OpenDNS Detection",
"clientIP": "208.142.125.204",
"serverIP": "181.230.138.123",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"208.142.125.204","externalIp":"181.230.138.123","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=208.142.125.204 ::: serverIP=181.230.138.123 ::: userName=charlie ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"208.142.125.204","externalIp":"181.230.138.123","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=208.142.125.204 ::: serverIP=181.230.138.123 ::: userName=charlie ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: tp.21ca3455c-frontier.bookdepository.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: tp.21ca3455c-frontier.bookdepository.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-24T16:43:03.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
streamName: OpenDNS Detection
clientIP: 208.142.125.204
serverIP: 181.230.138.123
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"71.239.55.65","externalIp":"0.241.103.36","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=71.239.55.65 ::: serverIP=0.241.103.36 ::: userName=charlie ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "tp.21ca3455c-frontier.bookdepository.com",
"message": "WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"71.239.55.65\",\"externalIp\":\"0.241.103.36\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"tp.21ca3455c-frontier.bookdepository.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T16:43:03.000Z\"} ::: clientIP=71.239.55.65 ::: serverIP=0.241.103.36 ::: userName=charlie ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "tp.21ca3455c-frontier.bookdepository.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-24T16:43:03.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"streamName": "OpenDNS Detection",
"clientIP": "71.239.55.65",
"serverIP": "0.241.103.36",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"71.239.55.65","externalIp":"0.241.103.36","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=71.239.55.65 ::: serverIP=0.241.103.36 ::: userName=charlie ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"71.239.55.65","externalIp":"0.241.103.36","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=71.239.55.65 ::: serverIP=0.241.103.36 ::: userName=charlie ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: tp.21ca3455c-frontier.bookdepository.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: tp.21ca3455c-frontier.bookdepository.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-24T16:43:03.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
streamName: OpenDNS Detection
clientIP: 71.239.55.65
serverIP: 0.241.103.36
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.vipleague.lc ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"24.244.129.234","externalIp":"158.102.241.77","categories":["Potentially Harmful","Illegal Downloads"],"tags":[],"destination":"www.vipleague.lc","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T19:08:18.000Z"} ::: clientIP=24.244.129.234 ::: serverIP=158.102.241.77 ::: userName=janedoe ::: created_at=2023-03-24T19:08:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulIllegal Downloads ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T19:08:18.000Z ::: serverHostname=www.vipleague.lc ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "www.vipleague.lc",
"message": "WitFoo-Artifact ::: fqdn=www.vipleague.lc ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"24.244.129.234\",\"externalIp\":\"158.102.241.77\",\"categories\":[\"Potentially Harmful\",\"Illegal Downloads\"],\"tags\":[],\"destination\":\"www.vipleague.lc\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T19:08:18.000Z\"} ::: clientIP=24.244.129.234 ::: serverIP=158.102.241.77 ::: userName=janedoe ::: created_at=2023-03-24T19:08:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulIllegal Downloads ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T19:08:18.000Z ::: serverHostname=www.vipleague.lc ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "www.vipleague.lc",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-24T19:08:18.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Potentially HarmfulIllegal Downloads",
"streamName": "OpenDNS Detection",
"clientIP": "24.244.129.234",
"serverIP": "158.102.241.77",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.vipleague.lc ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"24.244.129.234","externalIp":"158.102.241.77","categories":["Potentially Harmful","Illegal Downloads"],"tags":[],"destination":"www.vipleague.lc","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T19:08:18.000Z"} ::: clientIP=24.244.129.234 ::: serverIP=158.102.241.77 ::: userName=janedoe ::: created_at=2023-03-24T19:08:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulIllegal Downloads ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T19:08:18.000Z ::: serverHostname=www.vipleague.lc ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.vipleague.lc ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"24.244.129.234","externalIp":"158.102.241.77","categories":["Potentially Harmful","Illegal Downloads"],"tags":[],"destination":"www.vipleague.lc","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T19:08:18.000Z"} ::: clientIP=24.244.129.234 ::: serverIP=158.102.241.77 ::: userName=janedoe ::: created_at=2023-03-24T19:08:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulIllegal Downloads ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T19:08:18.000Z ::: serverHostname=www.vipleague.lc ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: www.vipleague.lc
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: www.vipleague.lc
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-24T19:08:18.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Potentially HarmfulIllegal Downloads
streamName: OpenDNS Detection
clientIP: 24.244.129.234
serverIP: 158.102.241.77
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.vipleague.lc ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"223.9.242.104","externalIp":"104.5.251.123","categories":["Potentially Harmful","Illegal Downloads"],"tags":[],"destination":"www.vipleague.lc","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T19:08:18.000Z"} ::: clientIP=223.9.242.104 ::: serverIP=104.5.251.123 ::: userName=janedoe ::: created_at=2023-03-24T19:08:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulIllegal Downloads ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T19:08:18.000Z ::: serverHostname=www.vipleague.lc ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "www.vipleague.lc",
"message": "WitFoo-Artifact ::: fqdn=www.vipleague.lc ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"223.9.242.104\",\"externalIp\":\"104.5.251.123\",\"categories\":[\"Potentially Harmful\",\"Illegal Downloads\"],\"tags\":[],\"destination\":\"www.vipleague.lc\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T19:08:18.000Z\"} ::: clientIP=223.9.242.104 ::: serverIP=104.5.251.123 ::: userName=janedoe ::: created_at=2023-03-24T19:08:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulIllegal Downloads ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T19:08:18.000Z ::: serverHostname=www.vipleague.lc ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "www.vipleague.lc",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-24T19:08:18.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Potentially HarmfulIllegal Downloads",
"streamName": "OpenDNS Detection",
"clientIP": "223.9.242.104",
"serverIP": "104.5.251.123",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.vipleague.lc ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"223.9.242.104","externalIp":"104.5.251.123","categories":["Potentially Harmful","Illegal Downloads"],"tags":[],"destination":"www.vipleague.lc","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T19:08:18.000Z"} ::: clientIP=223.9.242.104 ::: serverIP=104.5.251.123 ::: userName=janedoe ::: created_at=2023-03-24T19:08:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulIllegal Downloads ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T19:08:18.000Z ::: serverHostname=www.vipleague.lc ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.vipleague.lc ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"223.9.242.104","externalIp":"104.5.251.123","categories":["Potentially Harmful","Illegal Downloads"],"tags":[],"destination":"www.vipleague.lc","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-24T19:08:18.000Z"} ::: clientIP=223.9.242.104 ::: serverIP=104.5.251.123 ::: userName=janedoe ::: created_at=2023-03-24T19:08:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulIllegal Downloads ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T19:08:18.000Z ::: serverHostname=www.vipleague.lc ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: www.vipleague.lc
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: www.vipleague.lc
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-24T19:08:18.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Potentially HarmfulIllegal Downloads
streamName: OpenDNS Detection
clientIP: 223.9.242.104
serverIP: 104.5.251.123
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"51.54.163.181","externalIp":"206.182.203.58","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=51.54.163.181 ::: serverIP=206.182.203.58 ::: userName=bob ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "tp.21ca3455c-frontier.bookdepository.com",
"message": "WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"51.54.163.181\",\"externalIp\":\"206.182.203.58\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"tp.21ca3455c-frontier.bookdepository.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T16:43:03.000Z\"} ::: clientIP=51.54.163.181 ::: serverIP=206.182.203.58 ::: userName=bob ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "tp.21ca3455c-frontier.bookdepository.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-24T16:43:03.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"streamName": "OpenDNS Detection",
"clientIP": "51.54.163.181",
"serverIP": "206.182.203.58",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"51.54.163.181","externalIp":"206.182.203.58","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=51.54.163.181 ::: serverIP=206.182.203.58 ::: userName=bob ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"51.54.163.181","externalIp":"206.182.203.58","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=51.54.163.181 ::: serverIP=206.182.203.58 ::: userName=bob ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: tp.21ca3455c-frontier.bookdepository.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: tp.21ca3455c-frontier.bookdepository.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-24T16:43:03.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
streamName: OpenDNS Detection
clientIP: 51.54.163.181
serverIP: 206.182.203.58
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"165.54.124.106","externalIp":"110.161.48.119","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=165.54.124.106 ::: serverIP=110.161.48.119 ::: userName=johndoe ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "tp.21ca3455c-frontier.bookdepository.com",
"message": "WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"165.54.124.106\",\"externalIp\":\"110.161.48.119\",\"categories\":[\"Ecommerce/Shopping\",\"Phishing\",\"Infrastructure and Content Delivery Networks\",\"Application\",\"Shopping\"],\"tags\":[],\"destination\":\"tp.21ca3455c-frontier.bookdepository.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-24T16:43:03.000Z\"} ::: clientIP=165.54.124.106 ::: serverIP=110.161.48.119 ::: userName=johndoe ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "tp.21ca3455c-frontier.bookdepository.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-24T16:43:03.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping",
"streamName": "OpenDNS Detection",
"clientIP": "165.54.124.106",
"serverIP": "110.161.48.119",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"165.54.124.106","externalIp":"110.161.48.119","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=165.54.124.106 ::: serverIP=110.161.48.119 ::: userName=johndoe ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=tp.21ca3455c-frontier.bookdepository.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"165.54.124.106","externalIp":"110.161.48.119","categories":["Ecommerce/Shopping","Phishing","Infrastructure and Content Delivery Networks","Application","Shopping"],"tags":[],"destination":"tp.21ca3455c-frontier.bookdepository.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-24T16:43:03.000Z"} ::: clientIP=165.54.124.106 ::: serverIP=110.161.48.119 ::: userName=johndoe ::: created_at=2023-03-24T16:43:03.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-24T16:43:03.000Z ::: serverHostname=tp.21ca3455c-frontier.bookdepository.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: tp.21ca3455c-frontier.bookdepository.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: tp.21ca3455c-frontier.bookdepository.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-24T16:43:03.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Ecommerce/ShoppingPhishingInfrastructure and Content Delivery NetworksApplicationShopping
streamName: OpenDNS Detection
clientIP: 165.54.124.106
serverIP: 110.161.48.119
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"19.160.138.39","externalIp":"19.160.138.39","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=19.160.138.39 ::: serverIP=19.160.138.39 ::: userName=alice ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "www.ticolugar.com",
"message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"19.160.138.39\",\"externalIp\":\"19.160.138.39\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T06:11:22.000Z\"} ::: clientIP=19.160.138.39 ::: serverIP=19.160.138.39 ::: userName=alice ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "www.ticolugar.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-01-16T06:11:22.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareReal Estate",
"streamName": "OpenDNS Detection",
"clientIP": "19.160.138.39",
"serverIP": "51.211.46.244",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"19.160.138.39","externalIp":"19.160.138.39","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=19.160.138.39 ::: serverIP=19.160.138.39 ::: userName=alice ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"19.160.138.39","externalIp":"19.160.138.39","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=19.160.138.39 ::: serverIP=19.160.138.39 ::: userName=alice ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: www.ticolugar.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: www.ticolugar.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-01-16T06:11:22.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareReal Estate
streamName: OpenDNS Detection
clientIP: 19.160.138.39
serverIP: 51.211.46.244
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"94.6.228.186","externalIp":"94.6.228.186","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=94.6.228.186 ::: serverIP=94.6.228.186 ::: userName=charlie ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "www.ticolugar.com",
"message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"94.6.228.186\",\"externalIp\":\"94.6.228.186\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T06:11:22.000Z\"} ::: clientIP=94.6.228.186 ::: serverIP=94.6.228.186 ::: userName=charlie ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "www.ticolugar.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-01-16T06:11:22.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareReal Estate",
"streamName": "OpenDNS Detection",
"clientIP": "94.6.228.186",
"serverIP": "157.1.70.92",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"94.6.228.186","externalIp":"94.6.228.186","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=94.6.228.186 ::: serverIP=94.6.228.186 ::: userName=charlie ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"94.6.228.186","externalIp":"94.6.228.186","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=94.6.228.186 ::: serverIP=94.6.228.186 ::: userName=charlie ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: www.ticolugar.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: www.ticolugar.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-01-16T06:11:22.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareReal Estate
streamName: OpenDNS Detection
clientIP: 94.6.228.186
serverIP: 157.1.70.92
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"146.90.160.10","externalIp":"146.90.160.10","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=146.90.160.10 ::: serverIP=146.90.160.10 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"146.90.160.10\",\"externalIp\":\"146.90.160.10\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=146.90.160.10 ::: serverIP=146.90.160.10 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-11-02T11:55:45.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareEntertainment",
"streamName": "OpenDNS Detection",
"clientIP": "146.90.160.10",
"serverIP": "42.125.162.162",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"146.90.160.10","externalIp":"146.90.160.10","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=146.90.160.10 ::: serverIP=146.90.160.10 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"146.90.160.10","externalIp":"146.90.160.10","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=146.90.160.10 ::: serverIP=146.90.160.10 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-11-02T11:55:45.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareEntertainment
streamName: OpenDNS Detection
clientIP: 146.90.160.10
serverIP: 42.125.162.162
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"226.15.142.34","externalIp":"226.15.142.34","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=226.15.142.34 ::: serverIP=226.15.142.34 ::: userName=janedoe ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"226.15.142.34\",\"externalIp\":\"226.15.142.34\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=226.15.142.34 ::: serverIP=226.15.142.34 ::: userName=janedoe ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-11-02T11:55:45.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareEntertainment",
"streamName": "OpenDNS Detection",
"clientIP": "226.15.142.34",
"serverIP": "113.79.127.136",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"226.15.142.34","externalIp":"226.15.142.34","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=226.15.142.34 ::: serverIP=226.15.142.34 ::: userName=janedoe ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"226.15.142.34","externalIp":"226.15.142.34","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=226.15.142.34 ::: serverIP=226.15.142.34 ::: userName=janedoe ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-11-02T11:55:45.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareEntertainment
streamName: OpenDNS Detection
clientIP: 226.15.142.34
serverIP: 113.79.127.136
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"155.0.19.143","externalIp":"155.0.19.143","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=155.0.19.143 ::: serverIP=155.0.19.143 ::: userName=janedoe ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "www.ticolugar.com",
"message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"155.0.19.143\",\"externalIp\":\"155.0.19.143\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T06:11:22.000Z\"} ::: clientIP=155.0.19.143 ::: serverIP=155.0.19.143 ::: userName=janedoe ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "www.ticolugar.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-01-16T06:11:22.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareReal Estate",
"streamName": "OpenDNS Detection",
"clientIP": "155.0.19.143",
"serverIP": "44.93.118.88",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"155.0.19.143","externalIp":"155.0.19.143","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=155.0.19.143 ::: serverIP=155.0.19.143 ::: userName=janedoe ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"155.0.19.143","externalIp":"155.0.19.143","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=155.0.19.143 ::: serverIP=155.0.19.143 ::: userName=janedoe ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: www.ticolugar.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: www.ticolugar.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-01-16T06:11:22.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareReal Estate
streamName: OpenDNS Detection
clientIP: 155.0.19.143
serverIP: 44.93.118.88
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"189.158.13.218","externalIp":"189.158.13.218","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=189.158.13.218 ::: serverIP=189.158.13.218 ::: userName=fish ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "www.ticolugar.com",
"message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"189.158.13.218\",\"externalIp\":\"189.158.13.218\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T06:11:22.000Z\"} ::: clientIP=189.158.13.218 ::: serverIP=189.158.13.218 ::: userName=fish ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "www.ticolugar.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-01-16T06:11:22.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareReal Estate",
"streamName": "OpenDNS Detection",
"clientIP": "189.158.13.218",
"serverIP": "19.118.83.117",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"189.158.13.218","externalIp":"189.158.13.218","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=189.158.13.218 ::: serverIP=189.158.13.218 ::: userName=fish ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"189.158.13.218","externalIp":"189.158.13.218","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=189.158.13.218 ::: serverIP=189.158.13.218 ::: userName=fish ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: www.ticolugar.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: www.ticolugar.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-01-16T06:11:22.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareReal Estate
streamName: OpenDNS Detection
clientIP: 189.158.13.218
serverIP: 19.118.83.117
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"68.229.186.99","externalIp":"68.229.186.99","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=68.229.186.99 ::: serverIP=68.229.186.99 ::: userName=bob ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "www.ticolugar.com",
"message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"68.229.186.99\",\"externalIp\":\"68.229.186.99\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T06:11:22.000Z\"} ::: clientIP=68.229.186.99 ::: serverIP=68.229.186.99 ::: userName=bob ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "www.ticolugar.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-01-16T06:11:22.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareReal Estate",
"streamName": "OpenDNS Detection",
"clientIP": "68.229.186.99",
"serverIP": "177.177.203.41",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"68.229.186.99","externalIp":"68.229.186.99","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=68.229.186.99 ::: serverIP=68.229.186.99 ::: userName=bob ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"68.229.186.99","externalIp":"68.229.186.99","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=68.229.186.99 ::: serverIP=68.229.186.99 ::: userName=bob ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: www.ticolugar.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: www.ticolugar.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-01-16T06:11:22.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareReal Estate
streamName: OpenDNS Detection
clientIP: 68.229.186.99
serverIP: 177.177.203.41
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"54.82.24.165","externalIp":"54.82.24.165","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=54.82.24.165 ::: serverIP=54.82.24.165 ::: userName=fish ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "www.ticolugar.com",
"message": "WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"54.82.24.165\",\"externalIp\":\"54.82.24.165\",\"categories\":[\"Malware\",\"Real Estate\"],\"tags\":[],\"destination\":\"www.ticolugar.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T06:11:22.000Z\"} ::: clientIP=54.82.24.165 ::: serverIP=54.82.24.165 ::: userName=fish ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "www.ticolugar.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-01-16T06:11:22.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareReal Estate",
"streamName": "OpenDNS Detection",
"clientIP": "54.82.24.165",
"serverIP": "45.57.37.88",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"54.82.24.165","externalIp":"54.82.24.165","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=54.82.24.165 ::: serverIP=54.82.24.165 ::: userName=fish ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.ticolugar.com ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"54.82.24.165","externalIp":"54.82.24.165","categories":["Malware","Real Estate"],"tags":[],"destination":"www.ticolugar.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-16T06:11:22.000Z"} ::: clientIP=54.82.24.165 ::: serverIP=54.82.24.165 ::: userName=fish ::: created_at=2023-01-16T06:11:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T06:11:22.000Z ::: serverHostname=www.ticolugar.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: www.ticolugar.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: www.ticolugar.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-01-16T06:11:22.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareReal Estate
streamName: OpenDNS Detection
clientIP: 54.82.24.165
serverIP: 45.57.37.88
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"70.225.135.181","externalIp":"70.225.135.181","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=70.225.135.181 ::: serverIP=70.225.135.181 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"70.225.135.181\",\"externalIp\":\"70.225.135.181\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=70.225.135.181 ::: serverIP=70.225.135.181 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-11-02T11:55:45.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareEntertainment",
"streamName": "OpenDNS Detection",
"clientIP": "70.225.135.181",
"serverIP": "105.210.11.248",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"70.225.135.181","externalIp":"70.225.135.181","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=70.225.135.181 ::: serverIP=70.225.135.181 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"70.225.135.181","externalIp":"70.225.135.181","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=70.225.135.181 ::: serverIP=70.225.135.181 ::: userName=bob ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-11-02T11:55:45.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareEntertainment
streamName: OpenDNS Detection
clientIP: 70.225.135.181
serverIP: 105.210.11.248
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"239.240.203.247","externalIp":"239.240.203.247","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=239.240.203.247 ::: serverIP=239.240.203.247 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"239.240.203.247\",\"externalIp\":\"239.240.203.247\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=239.240.203.247 ::: serverIP=239.240.203.247 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-11-02T11:55:45.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareEntertainment",
"streamName": "OpenDNS Detection",
"clientIP": "239.240.203.247",
"serverIP": "57.159.31.108",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"239.240.203.247","externalIp":"239.240.203.247","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=239.240.203.247 ::: serverIP=239.240.203.247 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"239.240.203.247","externalIp":"239.240.203.247","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=239.240.203.247 ::: serverIP=239.240.203.247 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-11-02T11:55:45.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareEntertainment
streamName: OpenDNS Detection
clientIP: 239.240.203.247
serverIP: 57.159.31.108
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"150.219.156.142","externalIp":"150.219.156.142","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=150.219.156.142 ::: serverIP=150.219.156.142 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"150.219.156.142\",\"externalIp\":\"150.219.156.142\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=150.219.156.142 ::: serverIP=150.219.156.142 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-11-02T11:55:45.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareEntertainment",
"streamName": "OpenDNS Detection",
"clientIP": "150.219.156.142",
"serverIP": "6.218.199.13",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"150.219.156.142","externalIp":"150.219.156.142","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=150.219.156.142 ::: serverIP=150.219.156.142 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"150.219.156.142","externalIp":"150.219.156.142","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=150.219.156.142 ::: serverIP=150.219.156.142 ::: userName=nighthawk ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-11-02T11:55:45.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareEntertainment
streamName: OpenDNS Detection
clientIP: 150.219.156.142
serverIP: 6.218.199.13
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"94.54.245.3","externalIp":"94.54.245.3","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=94.54.245.3 ::: serverIP=94.54.245.3 ::: userName=fish ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"message": "WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"94.54.245.3\",\"externalIp\":\"94.54.245.3\",\"categories\":[\"Malware\",\"Entertainment\"],\"tags\":[],\"destination\":\"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-02T11:55:45.000Z\"} ::: clientIP=94.54.245.3 ::: serverIP=94.54.245.3 ::: userName=fish ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-11-02T11:55:45.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareEntertainment",
"streamName": "OpenDNS Detection",
"clientIP": "94.54.245.3",
"serverIP": "150.148.248.4",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"94.54.245.3","externalIp":"94.54.245.3","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=94.54.245.3 ::: serverIP=94.54.245.3 ::: userName=fish ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"94.54.245.3","externalIp":"94.54.245.3","categories":["Malware","Entertainment"],"tags":[],"destination":"cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-02T11:55:45.000Z"} ::: clientIP=94.54.245.3 ::: serverIP=94.54.245.3 ::: userName=fish ::: created_at=2022-11-02T11:55:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareEntertainment ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-02T11:55:45.000Z ::: serverHostname=cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cdh3u4v9aejvf4o00010u1qio8fw3ut4h.oast.fun
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-11-02T11:55:45.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareEntertainment
streamName: OpenDNS Detection
clientIP: 94.54.245.3
serverIP: 150.148.248.4
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"157.187.12.125","externalIp":"131.53.253.246","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=157.187.12.125 ::: serverIP=131.53.253.246 ::: userName=alice ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "genzfeeds.com",
"message": "WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"157.187.12.125\",\"externalIp\":\"131.53.253.246\",\"categories\":[\"Forums/Message boards\",\"Phishing\",\"Online Communities\"],\"tags\":[],\"destination\":\"genzfeeds.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-03T14:04:10.000Z\"} ::: clientIP=157.187.12.125 ::: serverIP=131.53.253.246 ::: userName=alice ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "genzfeeds.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-03T14:04:10.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Forums/Message boardsPhishingOnline Communities",
"streamName": "OpenDNS Detection",
"clientIP": "157.187.12.125",
"serverIP": "131.53.253.246",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"157.187.12.125","externalIp":"131.53.253.246","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=157.187.12.125 ::: serverIP=131.53.253.246 ::: userName=alice ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"157.187.12.125","externalIp":"131.53.253.246","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=157.187.12.125 ::: serverIP=131.53.253.246 ::: userName=alice ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: genzfeeds.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: genzfeeds.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-03T14:04:10.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Forums/Message boardsPhishingOnline Communities
streamName: OpenDNS Detection
clientIP: 157.187.12.125
serverIP: 131.53.253.246
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"131.5.229.200","externalIp":"148.227.40.148","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=131.5.229.200 ::: serverIP=148.227.40.148 ::: userName=bob ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "genzfeeds.com",
"message": "WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"131.5.229.200\",\"externalIp\":\"148.227.40.148\",\"categories\":[\"Forums/Message boards\",\"Phishing\",\"Online Communities\"],\"tags\":[],\"destination\":\"genzfeeds.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-03T14:04:10.000Z\"} ::: clientIP=131.5.229.200 ::: serverIP=148.227.40.148 ::: userName=bob ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "genzfeeds.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-03T14:04:10.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Forums/Message boardsPhishingOnline Communities",
"streamName": "OpenDNS Detection",
"clientIP": "131.5.229.200",
"serverIP": "148.227.40.148",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"131.5.229.200","externalIp":"148.227.40.148","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=131.5.229.200 ::: serverIP=148.227.40.148 ::: userName=bob ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"131.5.229.200","externalIp":"148.227.40.148","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=131.5.229.200 ::: serverIP=148.227.40.148 ::: userName=bob ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: genzfeeds.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: genzfeeds.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-03T14:04:10.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Forums/Message boardsPhishingOnline Communities
streamName: OpenDNS Detection
clientIP: 131.5.229.200
serverIP: 148.227.40.148
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"73.141.2.61","externalIp":"75.198.228.11","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=73.141.2.61 ::: serverIP=75.198.228.11 ::: userName=janedoe ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "genzfeeds.com",
"message": "WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"73.141.2.61\",\"externalIp\":\"75.198.228.11\",\"categories\":[\"Forums/Message boards\",\"Phishing\",\"Online Communities\"],\"tags\":[],\"destination\":\"genzfeeds.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-03T14:04:10.000Z\"} ::: clientIP=73.141.2.61 ::: serverIP=75.198.228.11 ::: userName=janedoe ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "genzfeeds.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-03T14:04:10.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Forums/Message boardsPhishingOnline Communities",
"streamName": "OpenDNS Detection",
"clientIP": "73.141.2.61",
"serverIP": "75.198.228.11",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"73.141.2.61","externalIp":"75.198.228.11","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=73.141.2.61 ::: serverIP=75.198.228.11 ::: userName=janedoe ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"73.141.2.61","externalIp":"75.198.228.11","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=73.141.2.61 ::: serverIP=75.198.228.11 ::: userName=janedoe ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: genzfeeds.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: genzfeeds.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-03T14:04:10.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Forums/Message boardsPhishingOnline Communities
streamName: OpenDNS Detection
clientIP: 73.141.2.61
serverIP: 75.198.228.11
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"126.214.115.78","externalIp":"27.92.132.5","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=126.214.115.78 ::: serverIP=27.92.132.5 ::: userName=charlie ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "genzfeeds.com",
"message": "WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"126.214.115.78\",\"externalIp\":\"27.92.132.5\",\"categories\":[\"Forums/Message boards\",\"Phishing\",\"Online Communities\"],\"tags\":[],\"destination\":\"genzfeeds.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-03T14:04:10.000Z\"} ::: clientIP=126.214.115.78 ::: serverIP=27.92.132.5 ::: userName=charlie ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "genzfeeds.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-03T14:04:10.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Forums/Message boardsPhishingOnline Communities",
"streamName": "OpenDNS Detection",
"clientIP": "126.214.115.78",
"serverIP": "27.92.132.5",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"126.214.115.78","externalIp":"27.92.132.5","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=126.214.115.78 ::: serverIP=27.92.132.5 ::: userName=charlie ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"126.214.115.78","externalIp":"27.92.132.5","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=126.214.115.78 ::: serverIP=27.92.132.5 ::: userName=charlie ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: genzfeeds.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: genzfeeds.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-03T14:04:10.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Forums/Message boardsPhishingOnline Communities
streamName: OpenDNS Detection
clientIP: 126.214.115.78
serverIP: 27.92.132.5
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"88.23.136.15","externalIp":"6.35.188.22","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=88.23.136.15 ::: serverIP=6.35.188.22 ::: userName=nighthawk ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "genzfeeds.com",
"message": "WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"88.23.136.15\",\"externalIp\":\"6.35.188.22\",\"categories\":[\"Forums/Message boards\",\"Phishing\",\"Online Communities\"],\"tags\":[],\"destination\":\"genzfeeds.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-03T14:04:10.000Z\"} ::: clientIP=88.23.136.15 ::: serverIP=6.35.188.22 ::: userName=nighthawk ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "genzfeeds.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-03T14:04:10.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Forums/Message boardsPhishingOnline Communities",
"streamName": "OpenDNS Detection",
"clientIP": "88.23.136.15",
"serverIP": "6.35.188.22",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"88.23.136.15","externalIp":"6.35.188.22","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=88.23.136.15 ::: serverIP=6.35.188.22 ::: userName=nighthawk ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"88.23.136.15","externalIp":"6.35.188.22","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=88.23.136.15 ::: serverIP=6.35.188.22 ::: userName=nighthawk ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: genzfeeds.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: genzfeeds.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-03T14:04:10.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Forums/Message boardsPhishingOnline Communities
streamName: OpenDNS Detection
clientIP: 88.23.136.15
serverIP: 6.35.188.22
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"5.109.80.145","externalIp":"29.103.123.36","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=5.109.80.145 ::: serverIP=29.103.123.36 ::: userName=fish ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "genzfeeds.com",
"message": "WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"5.109.80.145\",\"externalIp\":\"29.103.123.36\",\"categories\":[\"Forums/Message boards\",\"Phishing\",\"Online Communities\"],\"tags\":[],\"destination\":\"genzfeeds.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-03T14:04:10.000Z\"} ::: clientIP=5.109.80.145 ::: serverIP=29.103.123.36 ::: userName=fish ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "genzfeeds.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-03T14:04:10.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Forums/Message boardsPhishingOnline Communities",
"streamName": "OpenDNS Detection",
"clientIP": "5.109.80.145",
"serverIP": "29.103.123.36",
"userName": "fish"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.