input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"5.109.80.145","externalIp":"29.103.123.36","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=5.109.80.145 ::: serverIP=29.103.123.36 ::: userName=fish ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"5.109.80.145","externalIp":"29.103.123.36","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=5.109.80.145 ::: serverIP=29.103.123.36 ::: userName=fish ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: genzfeeds.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: genzfeeds.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-03T14:04:10.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Forums/Message boardsPhishingOnline Communities streamName: OpenDNS Detection clientIP: 5.109.80.145 serverIP: 29.103.123.36 userName: fish
Explain this syslog message
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"fish","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"fish"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"fish","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"221.209.182.76","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4UMBRELLADiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTUMBRELLAB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTUMBRELLAB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"221.209.182.76","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=221.209.182.76 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
{ "action": "FAILURE", "georegion": "United States", "message": "WitFoo-Artifact ::: tags=[\"description=User login to Okta\",\"userDisplay=Dayna Herron | Loan Processing Dept\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u2jhpd38G7OC3Jz697\",\"status\":\"ACTIVE\",\"created\":\"2022-09-27T14:53:34.000Z\",\"activated\":\"2022-09-27T14:53:34.000Z\",\"statusChanged\":\"2023-09-13T15:02:20.000Z\",\"lastLogin\":\"2023-10-31T14:40:40.000Z\",\"lastUpdated\":\"2023-09-13T15:02:20.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"lastName\":\"Herron\",\"zipCode\":\"92108\",\"city\":\"San Diego\",\"displayName\":\"Dayna Herron\",\"secondEmail\":null,\"title\":\"Senior Loan Administrator\",\"login\":\"fish\",\"firstName\":\"Dayna\",\"primaryPhone\":\"(760) 759-1713\",\"immutableID\":\"NgxQN2IySUqPCQGtoILdUw==\",\"mobilePhone\":null,\"countryCode\":\"US\",\"state\":\"CA\",\"department\":\"Loan Processing Dept\",\"email\":\"fish\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697\"},\"resetFactors\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u2jhpd38G7OC3Jz697\",\"type\":\"User\",\"alternateId\":\"fish\",\"displayName\":\"Dayna Herron\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko\",\"os\":\"Windows 8\",\"browser\":\"IE11\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":null,\"ipAddress\":\"221.209.182.76\",\"geographicalContext\":{\"city\":\"Winchester\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92596\",\"geolocation\":{\"lat\":33.6206,\"lon\":-117.0867}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxsc6tTEcKTkil6dWISMF4Hw\"},\"displayMessage\":\"User login to Okta\",\"eventType\":\"user.session.start\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"INVALID_CREDENTIALS\"},\"published\":\"2023-10-31T13:56:38.064Z\",\"securityContext\":{\"asNumber\":5650,\"asOrg\":\"frontier communications\",\"isp\":\"frontier communications of america inc.\",\"domain\":\".\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZUEHR82y0nSbx83djtcx4UMBRELLADiw\",\"deviceFingerprint\":\"9beff0acfec08b61e5955b8d7f792041\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.11.2\",\"requestId\":\"ZUEHlWiXn-Elf7oEyN5WTUMBRELLAB8s\",\"dtHash\":\"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\",\"logOnlySecurityData\":\"{\\\"risk\\\":{\\\"level\\\":\\\"LOW\\\"},\\\"behaviors\\\":{\\\"New Geo-Location\\\":\\\"NEGATIVE\\\",\\\"New Device\\\":\\\"NEGATIVE\\\",\\\"New IP\\\":\\\"NEGATIVE\\\",\\\"New State\\\":\\\"NEGATIVE\\\",\\\"New Country\\\":\\\"NEGATIVE\\\",\\\"Velocity\\\":\\\"NEGATIVE\\\",\\\"New City\\\":\\\"NEGATIVE\\\"}}\"}},\"legacyEventType\":\"core.user_auth.login_failed\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZUEHlWiXn-Elf7oEyN5WTUMBRELLAB8s\",\"detail\":{}},\"uuid\":\"4f90b398-77f5-11ee-adff-b9c95a9b9549\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"221.209.182.76\",\"geographicalContext\":{\"city\":\"Winchester\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92596\",\"geolocation\":{\"lat\":33.6206,\"lon\":-117.0867}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"laeaevaskHK7GVXYA696\",\"type\":\"AuthenticatorEnrollment\",\"alternateId\":\"unknown\",\"displayName\":\"Password\",\"detailEntry\":null},{\"id\":\"0oa29uf7l9ectzUsK697\",\"type\":\"AppInstance\",\"alternateId\":\"Palo Alto Networks - GlobalProtect\",\"displayName\":\"Palo Alto Networks - GlobalProtect\",\"detailEntry\":null}]}} ::: program=IE11 ::: clientIP=221.209.182.76 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "IE11", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 3, "severitylabel": "error", "sourceinfo": "unknown", "tags": [ "reason=WitFoo.Switch(FAILURE)", "Okta", "userDisplay=Dayna Herron | Loan Processing Dept", "description=User login to Okta", "auth_failure" ], "vendorcode": "user.session.start", "streamName": "Okta", "clientIP": "221.209.182.76", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"fish","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"fish"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"fish","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"221.209.182.76","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4UMBRELLADiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTUMBRELLAB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTUMBRELLAB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"221.209.182.76","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=221.209.182.76 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
Product: Okta Vendor: Okta
Identify this syslog message
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"fish","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"fish"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"fish","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"221.209.182.76","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4UMBRELLADiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTUMBRELLAB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTUMBRELLAB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"221.209.182.76","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=221.209.182.76 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message: action: FAILURE georegion: United States messagetype: auth_failure productids: [6] program: IE11 senderhost: kafka.precinct sensitivity: normal severitycode: 3 severitylabel: error sourceinfo: unknown tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'userDisplay=Dayna Herron | Loan Processing Dept', 'description=User login to Okta', 'auth_failure'] vendorcode: user.session.start streamName: Okta clientIP: 221.209.182.76 userName: fish
Explain this syslog message
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"fish","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"fish"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://stark.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://stark.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"fish","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"181.175.174.248","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4STARKDiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTSTARKB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTSTARKB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"181.175.174.248","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=181.175.174.248 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
{ "action": "FAILURE", "georegion": "United States", "message": "WitFoo-Artifact ::: tags=[\"description=User login to Okta\",\"userDisplay=Dayna Herron | Loan Processing Dept\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u2jhpd38G7OC3Jz697\",\"status\":\"ACTIVE\",\"created\":\"2022-09-27T14:53:34.000Z\",\"activated\":\"2022-09-27T14:53:34.000Z\",\"statusChanged\":\"2023-09-13T15:02:20.000Z\",\"lastLogin\":\"2023-10-31T14:40:40.000Z\",\"lastUpdated\":\"2023-09-13T15:02:20.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"lastName\":\"Herron\",\"zipCode\":\"92108\",\"city\":\"San Diego\",\"displayName\":\"Dayna Herron\",\"secondEmail\":null,\"title\":\"Senior Loan Administrator\",\"login\":\"fish\",\"firstName\":\"Dayna\",\"primaryPhone\":\"(760) 759-1713\",\"immutableID\":\"NgxQN2IySUqPCQGtoILdUw==\",\"mobilePhone\":null,\"countryCode\":\"US\",\"state\":\"CA\",\"department\":\"Loan Processing Dept\",\"email\":\"fish\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://stark.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697\"},\"resetFactors\":{\"href\":\"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://stark.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u2jhpd38G7OC3Jz697\",\"type\":\"User\",\"alternateId\":\"fish\",\"displayName\":\"Dayna Herron\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko\",\"os\":\"Windows 8\",\"browser\":\"IE11\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":null,\"ipAddress\":\"181.175.174.248\",\"geographicalContext\":{\"city\":\"Winchester\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92596\",\"geolocation\":{\"lat\":33.6206,\"lon\":-117.0867}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxsc6tTEcKTkil6dWISMF4Hw\"},\"displayMessage\":\"User login to Okta\",\"eventType\":\"user.session.start\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"INVALID_CREDENTIALS\"},\"published\":\"2023-10-31T13:56:38.064Z\",\"securityContext\":{\"asNumber\":5650,\"asOrg\":\"frontier communications\",\"isp\":\"frontier communications of america inc.\",\"domain\":\".\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZUEHR82y0nSbx83djtcx4STARKDiw\",\"deviceFingerprint\":\"9beff0acfec08b61e5955b8d7f792041\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.11.2\",\"requestId\":\"ZUEHlWiXn-Elf7oEyN5WTSTARKB8s\",\"dtHash\":\"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\",\"logOnlySecurityData\":\"{\\\"risk\\\":{\\\"level\\\":\\\"LOW\\\"},\\\"behaviors\\\":{\\\"New Geo-Location\\\":\\\"NEGATIVE\\\",\\\"New Device\\\":\\\"NEGATIVE\\\",\\\"New IP\\\":\\\"NEGATIVE\\\",\\\"New State\\\":\\\"NEGATIVE\\\",\\\"New Country\\\":\\\"NEGATIVE\\\",\\\"Velocity\\\":\\\"NEGATIVE\\\",\\\"New City\\\":\\\"NEGATIVE\\\"}}\"}},\"legacyEventType\":\"core.user_auth.login_failed\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZUEHlWiXn-Elf7oEyN5WTSTARKB8s\",\"detail\":{}},\"uuid\":\"4f90b398-77f5-11ee-adff-b9c95a9b9549\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"181.175.174.248\",\"geographicalContext\":{\"city\":\"Winchester\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92596\",\"geolocation\":{\"lat\":33.6206,\"lon\":-117.0867}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"laeaevaskHK7GVXYA696\",\"type\":\"AuthenticatorEnrollment\",\"alternateId\":\"unknown\",\"displayName\":\"Password\",\"detailEntry\":null},{\"id\":\"0oa29uf7l9ectzUsK697\",\"type\":\"AppInstance\",\"alternateId\":\"Palo Alto Networks - GlobalProtect\",\"displayName\":\"Palo Alto Networks - GlobalProtect\",\"detailEntry\":null}]}} ::: program=IE11 ::: clientIP=181.175.174.248 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "IE11", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 3, "severitylabel": "error", "sourceinfo": "unknown", "tags": [ "reason=WitFoo.Switch(FAILURE)", "Okta", "userDisplay=Dayna Herron | Loan Processing Dept", "description=User login to Okta", "auth_failure" ], "vendorcode": "user.session.start", "streamName": "Okta", "clientIP": "181.175.174.248", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"fish","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"fish"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://stark.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://stark.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"fish","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"181.175.174.248","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4STARKDiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTSTARKB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTSTARKB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"181.175.174.248","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=181.175.174.248 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
Product: Okta Vendor: Okta
Identify this syslog message
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"fish","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"fish"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://stark.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://stark.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"fish","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"181.175.174.248","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4STARKDiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTSTARKB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTSTARKB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"181.175.174.248","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=181.175.174.248 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message: action: FAILURE georegion: United States messagetype: auth_failure productids: [6] program: IE11 senderhost: kafka.precinct sensitivity: normal severitycode: 3 severitylabel: error sourceinfo: unknown tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'userDisplay=Dayna Herron | Loan Processing Dept', 'description=User login to Okta', 'auth_failure'] vendorcode: user.session.start streamName: Okta clientIP: 181.175.174.248 userName: fish
Explain this syslog message
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"nighthawk","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"nighthawk"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"nighthawk","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"80.138.47.134","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4OSCORPDiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTOSCORPB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTOSCORPB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"80.138.47.134","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=80.138.47.134 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
{ "action": "FAILURE", "georegion": "United States", "message": "WitFoo-Artifact ::: tags=[\"description=User login to Okta\",\"userDisplay=Dayna Herron | Loan Processing Dept\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u2jhpd38G7OC3Jz697\",\"status\":\"ACTIVE\",\"created\":\"2022-09-27T14:53:34.000Z\",\"activated\":\"2022-09-27T14:53:34.000Z\",\"statusChanged\":\"2023-09-13T15:02:20.000Z\",\"lastLogin\":\"2023-10-31T14:40:40.000Z\",\"lastUpdated\":\"2023-09-13T15:02:20.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"lastName\":\"Herron\",\"zipCode\":\"92108\",\"city\":\"San Diego\",\"displayName\":\"Dayna Herron\",\"secondEmail\":null,\"title\":\"Senior Loan Administrator\",\"login\":\"nighthawk\",\"firstName\":\"Dayna\",\"primaryPhone\":\"(760) 759-1713\",\"immutableID\":\"NgxQN2IySUqPCQGtoILdUw==\",\"mobilePhone\":null,\"countryCode\":\"US\",\"state\":\"CA\",\"department\":\"Loan Processing Dept\",\"email\":\"nighthawk\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697\"},\"resetFactors\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u2jhpd38G7OC3Jz697\",\"type\":\"User\",\"alternateId\":\"nighthawk\",\"displayName\":\"Dayna Herron\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko\",\"os\":\"Windows 8\",\"browser\":\"IE11\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":null,\"ipAddress\":\"80.138.47.134\",\"geographicalContext\":{\"city\":\"Winchester\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92596\",\"geolocation\":{\"lat\":33.6206,\"lon\":-117.0867}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxsc6tTEcKTkil6dWISMF4Hw\"},\"displayMessage\":\"User login to Okta\",\"eventType\":\"user.session.start\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"INVALID_CREDENTIALS\"},\"published\":\"2023-10-31T13:56:38.064Z\",\"securityContext\":{\"asNumber\":5650,\"asOrg\":\"frontier communications\",\"isp\":\"frontier communications of america inc.\",\"domain\":\".\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZUEHR82y0nSbx83djtcx4OSCORPDiw\",\"deviceFingerprint\":\"9beff0acfec08b61e5955b8d7f792041\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.11.2\",\"requestId\":\"ZUEHlWiXn-Elf7oEyN5WTOSCORPB8s\",\"dtHash\":\"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\",\"logOnlySecurityData\":\"{\\\"risk\\\":{\\\"level\\\":\\\"LOW\\\"},\\\"behaviors\\\":{\\\"New Geo-Location\\\":\\\"NEGATIVE\\\",\\\"New Device\\\":\\\"NEGATIVE\\\",\\\"New IP\\\":\\\"NEGATIVE\\\",\\\"New State\\\":\\\"NEGATIVE\\\",\\\"New Country\\\":\\\"NEGATIVE\\\",\\\"Velocity\\\":\\\"NEGATIVE\\\",\\\"New City\\\":\\\"NEGATIVE\\\"}}\"}},\"legacyEventType\":\"core.user_auth.login_failed\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZUEHlWiXn-Elf7oEyN5WTOSCORPB8s\",\"detail\":{}},\"uuid\":\"4f90b398-77f5-11ee-adff-b9c95a9b9549\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"80.138.47.134\",\"geographicalContext\":{\"city\":\"Winchester\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92596\",\"geolocation\":{\"lat\":33.6206,\"lon\":-117.0867}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"laeaevaskHK7GVXYA696\",\"type\":\"AuthenticatorEnrollment\",\"alternateId\":\"unknown\",\"displayName\":\"Password\",\"detailEntry\":null},{\"id\":\"0oa29uf7l9ectzUsK697\",\"type\":\"AppInstance\",\"alternateId\":\"Palo Alto Networks - GlobalProtect\",\"displayName\":\"Palo Alto Networks - GlobalProtect\",\"detailEntry\":null}]}} ::: program=IE11 ::: clientIP=80.138.47.134 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "IE11", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 3, "severitylabel": "error", "sourceinfo": "unknown", "tags": [ "reason=WitFoo.Switch(FAILURE)", "Okta", "userDisplay=Dayna Herron | Loan Processing Dept", "description=User login to Okta", "auth_failure" ], "vendorcode": "user.session.start", "streamName": "Okta", "clientIP": "80.138.47.134", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"nighthawk","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"nighthawk"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"nighthawk","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"80.138.47.134","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4OSCORPDiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTOSCORPB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTOSCORPB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"80.138.47.134","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=80.138.47.134 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
Product: Okta Vendor: Okta
Identify this syslog message
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"nighthawk","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"nighthawk"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"nighthawk","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"80.138.47.134","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4OSCORPDiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTOSCORPB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTOSCORPB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"80.138.47.134","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=80.138.47.134 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message: action: FAILURE georegion: United States messagetype: auth_failure productids: [6] program: IE11 senderhost: kafka.precinct sensitivity: normal severitycode: 3 severitylabel: error sourceinfo: unknown tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'userDisplay=Dayna Herron | Loan Processing Dept', 'description=User login to Okta', 'auth_failure'] vendorcode: user.session.start streamName: Okta clientIP: 80.138.47.134 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"janedoe","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"janedoe"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"janedoe","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"0.57.176.213","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4ACMEDiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTACMEB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTACMEB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"0.57.176.213","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=0.57.176.213 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
{ "action": "FAILURE", "georegion": "United States", "message": "WitFoo-Artifact ::: tags=[\"description=User login to Okta\",\"userDisplay=Dayna Herron | Loan Processing Dept\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u2jhpd38G7OC3Jz697\",\"status\":\"ACTIVE\",\"created\":\"2022-09-27T14:53:34.000Z\",\"activated\":\"2022-09-27T14:53:34.000Z\",\"statusChanged\":\"2023-09-13T15:02:20.000Z\",\"lastLogin\":\"2023-10-31T14:40:40.000Z\",\"lastUpdated\":\"2023-09-13T15:02:20.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"lastName\":\"Herron\",\"zipCode\":\"92108\",\"city\":\"San Diego\",\"displayName\":\"Dayna Herron\",\"secondEmail\":null,\"title\":\"Senior Loan Administrator\",\"login\":\"janedoe\",\"firstName\":\"Dayna\",\"primaryPhone\":\"(760) 759-1713\",\"immutableID\":\"NgxQN2IySUqPCQGtoILdUw==\",\"mobilePhone\":null,\"countryCode\":\"US\",\"state\":\"CA\",\"department\":\"Loan Processing Dept\",\"email\":\"janedoe\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697\"},\"resetFactors\":{\"href\":\"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u2jhpd38G7OC3Jz697\",\"type\":\"User\",\"alternateId\":\"janedoe\",\"displayName\":\"Dayna Herron\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko\",\"os\":\"Windows 8\",\"browser\":\"IE11\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":null,\"ipAddress\":\"0.57.176.213\",\"geographicalContext\":{\"city\":\"Winchester\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92596\",\"geolocation\":{\"lat\":33.6206,\"lon\":-117.0867}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxsc6tTEcKTkil6dWISMF4Hw\"},\"displayMessage\":\"User login to Okta\",\"eventType\":\"user.session.start\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"INVALID_CREDENTIALS\"},\"published\":\"2023-10-31T13:56:38.064Z\",\"securityContext\":{\"asNumber\":5650,\"asOrg\":\"frontier communications\",\"isp\":\"frontier communications of america inc.\",\"domain\":\".\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZUEHR82y0nSbx83djtcx4ACMEDiw\",\"deviceFingerprint\":\"9beff0acfec08b61e5955b8d7f792041\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.11.2\",\"requestId\":\"ZUEHlWiXn-Elf7oEyN5WTACMEB8s\",\"dtHash\":\"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\",\"logOnlySecurityData\":\"{\\\"risk\\\":{\\\"level\\\":\\\"LOW\\\"},\\\"behaviors\\\":{\\\"New Geo-Location\\\":\\\"NEGATIVE\\\",\\\"New Device\\\":\\\"NEGATIVE\\\",\\\"New IP\\\":\\\"NEGATIVE\\\",\\\"New State\\\":\\\"NEGATIVE\\\",\\\"New Country\\\":\\\"NEGATIVE\\\",\\\"Velocity\\\":\\\"NEGATIVE\\\",\\\"New City\\\":\\\"NEGATIVE\\\"}}\"}},\"legacyEventType\":\"core.user_auth.login_failed\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZUEHlWiXn-Elf7oEyN5WTACMEB8s\",\"detail\":{}},\"uuid\":\"4f90b398-77f5-11ee-adff-b9c95a9b9549\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"0.57.176.213\",\"geographicalContext\":{\"city\":\"Winchester\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92596\",\"geolocation\":{\"lat\":33.6206,\"lon\":-117.0867}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"laeaevaskHK7GVXYA696\",\"type\":\"AuthenticatorEnrollment\",\"alternateId\":\"unknown\",\"displayName\":\"Password\",\"detailEntry\":null},{\"id\":\"0oa29uf7l9ectzUsK697\",\"type\":\"AppInstance\",\"alternateId\":\"Palo Alto Networks - GlobalProtect\",\"displayName\":\"Palo Alto Networks - GlobalProtect\",\"detailEntry\":null}]}} ::: program=IE11 ::: clientIP=0.57.176.213 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "IE11", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 3, "severitylabel": "error", "sourceinfo": "unknown", "tags": [ "reason=WitFoo.Switch(FAILURE)", "Okta", "userDisplay=Dayna Herron | Loan Processing Dept", "description=User login to Okta", "auth_failure" ], "vendorcode": "user.session.start", "streamName": "Okta", "clientIP": "0.57.176.213", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"janedoe","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"janedoe"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"janedoe","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"0.57.176.213","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4ACMEDiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTACMEB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTACMEB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"0.57.176.213","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=0.57.176.213 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
Product: Okta Vendor: Okta
Identify this syslog message
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"janedoe","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"janedoe"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"janedoe","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"0.57.176.213","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4ACMEDiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTACMEB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTACMEB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"0.57.176.213","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=0.57.176.213 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message: action: FAILURE georegion: United States messagetype: auth_failure productids: [6] program: IE11 senderhost: kafka.precinct sensitivity: normal severitycode: 3 severitylabel: error sourceinfo: unknown tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'userDisplay=Dayna Herron | Loan Processing Dept', 'description=User login to Okta', 'auth_failure'] vendorcode: user.session.start streamName: Okta clientIP: 0.57.176.213 userName: janedoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t35.250.206.226\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"Nordc-DC-03.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"35.250.206.226","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}}
{ "action": "Logon", "clientport": 53321, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-14T01:13:07.863Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-14T01:13:08.811Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.wayne.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-BIOSE\\n\\tSource Network Address:\\t35.250.206.226\\n\\tSource Port:\\t\\t53321\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"Nordc-DC-03.wayne.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.wayne.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"35.250.206.226\",\"IpPort\":\"53321\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-BIOSE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":3588}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1316377383,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "Nordc-DC-03.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "1316377383", "streamName": "microsoft-windows-security-auditing", "clientIP": "35.250.206.226", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t35.250.206.226\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"Nordc-DC-03.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"35.250.206.226","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t35.250.206.226\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"Nordc-DC-03.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"35.250.206.226","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53321 messagetype: auth_failure productids: [6] senderhost: Nordc-DC-03.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 1316377383 streamName: microsoft-windows-security-auditing clientIP: 35.250.206.226 userName: nighthawk
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t217.229.203.31\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"Nordc-DC-03.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"217.229.203.31","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}}
{ "action": "Logon", "clientport": 53321, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-14T01:13:07.863Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-14T01:13:08.811Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.wayne.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-BIOSE\\n\\tSource Network Address:\\t217.229.203.31\\n\\tSource Port:\\t\\t53321\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"Nordc-DC-03.wayne.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.wayne.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"217.229.203.31\",\"IpPort\":\"53321\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-BIOSE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":3588}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1316377383,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "Nordc-DC-03.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "1316377383", "streamName": "microsoft-windows-security-auditing", "clientIP": "217.229.203.31", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t217.229.203.31\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"Nordc-DC-03.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"217.229.203.31","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t217.229.203.31\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"Nordc-DC-03.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"217.229.203.31","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53321 messagetype: auth_failure productids: [6] senderhost: Nordc-DC-03.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 1316377383 streamName: microsoft-windows-security-auditing clientIP: 217.229.203.31 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t108.220.10.232\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"108.220.10.232","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}}
{ "action": "Logon", "clientport": 53321, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-14T01:13:07.863Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-14T01:13:08.811Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-BIOSE\\n\\tSource Network Address:\\t108.220.10.232\\n\\tSource Port:\\t\\t53321\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"Nordc-DC-03.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.umbrella.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"108.220.10.232\",\"IpPort\":\"53321\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-BIOSE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":3588}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1316377383,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "Nordc-DC-03.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "1316377383", "streamName": "microsoft-windows-security-auditing", "clientIP": "108.220.10.232", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t108.220.10.232\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"108.220.10.232","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t108.220.10.232\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"108.220.10.232","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53321 messagetype: auth_failure productids: [6] senderhost: Nordc-DC-03.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 1316377383 streamName: microsoft-windows-security-auditing clientIP: 108.220.10.232 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t23.24.161.230\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"Nordc-DC-03.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"23.24.161.230","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}}
{ "action": "Logon", "clientport": 53321, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-14T01:13:07.863Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-14T01:13:08.811Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-BIOSE\\n\\tSource Network Address:\\t23.24.161.230\\n\\tSource Port:\\t\\t53321\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"Nordc-DC-03.stark.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"23.24.161.230\",\"IpPort\":\"53321\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-BIOSE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":3588}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1316377383,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "Nordc-DC-03.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "1316377383", "streamName": "microsoft-windows-security-auditing", "clientIP": "23.24.161.230", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t23.24.161.230\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"Nordc-DC-03.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"23.24.161.230","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t23.24.161.230\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"Nordc-DC-03.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"23.24.161.230","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53321 messagetype: auth_failure productids: [6] senderhost: Nordc-DC-03.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 1316377383 streamName: microsoft-windows-security-auditing clientIP: 23.24.161.230 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"144.129.138.116","externalIp":"144.129.138.116","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=144.129.138.116 ::: serverIP=144.129.138.116 ::: userName=fish ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-19T18:51:59.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"144.129.138.116\",\"externalIp\":\"144.129.138.116\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"entirelysacrament.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=144.129.138.116 ::: serverIP=144.129.138.116 ::: userName=fish ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "entirelysacrament.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "entirelysacrament.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "144.129.138.116", "serverIP": "247.239.205.246", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"144.129.138.116","externalIp":"144.129.138.116","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=144.129.138.116 ::: serverIP=144.129.138.116 ::: userName=fish ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"144.129.138.116","externalIp":"144.129.138.116","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=144.129.138.116 ::: serverIP=144.129.138.116 ::: userName=fish ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-19T18:51:59.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: entirelysacrament.com messagetype: firewall_action severitycode: 2 fqdn: entirelysacrament.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 144.129.138.116 serverIP: 247.239.205.246 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"180.68.249.76","externalIp":"180.68.249.76","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=180.68.249.76 ::: serverIP=180.68.249.76 ::: userName=bob ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-19T18:51:59.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"180.68.249.76\",\"externalIp\":\"180.68.249.76\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"entirelysacrament.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=180.68.249.76 ::: serverIP=180.68.249.76 ::: userName=bob ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "entirelysacrament.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "entirelysacrament.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "180.68.249.76", "serverIP": "125.62.74.66", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"180.68.249.76","externalIp":"180.68.249.76","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=180.68.249.76 ::: serverIP=180.68.249.76 ::: userName=bob ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"180.68.249.76","externalIp":"180.68.249.76","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=180.68.249.76 ::: serverIP=180.68.249.76 ::: userName=bob ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-19T18:51:59.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: entirelysacrament.com messagetype: firewall_action severitycode: 2 fqdn: entirelysacrament.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 180.68.249.76 serverIP: 125.62.74.66 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"193.167.39.212","externalIp":"193.167.39.212","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=193.167.39.212 ::: serverIP=193.167.39.212 ::: userName=bob ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-19T18:51:59.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"193.167.39.212\",\"externalIp\":\"193.167.39.212\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"entirelysacrament.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=193.167.39.212 ::: serverIP=193.167.39.212 ::: userName=bob ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "entirelysacrament.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "entirelysacrament.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "193.167.39.212", "serverIP": "131.120.55.216", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"193.167.39.212","externalIp":"193.167.39.212","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=193.167.39.212 ::: serverIP=193.167.39.212 ::: userName=bob ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"193.167.39.212","externalIp":"193.167.39.212","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=193.167.39.212 ::: serverIP=193.167.39.212 ::: userName=bob ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-19T18:51:59.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: entirelysacrament.com messagetype: firewall_action severitycode: 2 fqdn: entirelysacrament.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 193.167.39.212 serverIP: 131.120.55.216 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"48.35.238.83","externalIp":"48.35.238.83","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=48.35.238.83 ::: serverIP=48.35.238.83 ::: userName=alice ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-19T18:51:59.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"48.35.238.83\",\"externalIp\":\"48.35.238.83\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"entirelysacrament.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=48.35.238.83 ::: serverIP=48.35.238.83 ::: userName=alice ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "entirelysacrament.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "entirelysacrament.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "48.35.238.83", "serverIP": "63.49.179.133", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"48.35.238.83","externalIp":"48.35.238.83","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=48.35.238.83 ::: serverIP=48.35.238.83 ::: userName=alice ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"48.35.238.83","externalIp":"48.35.238.83","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=48.35.238.83 ::: serverIP=48.35.238.83 ::: userName=alice ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-19T18:51:59.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: entirelysacrament.com messagetype: firewall_action severitycode: 2 fqdn: entirelysacrament.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 48.35.238.83 serverIP: 63.49.179.133 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"61.225.19.71","externalIp":"61.225.19.71","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=61.225.19.71 ::: serverIP=61.225.19.71 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-19T18:51:59.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"61.225.19.71\",\"externalIp\":\"61.225.19.71\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"entirelysacrament.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=61.225.19.71 ::: serverIP=61.225.19.71 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "entirelysacrament.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "entirelysacrament.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "61.225.19.71", "serverIP": "90.106.244.173", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"61.225.19.71","externalIp":"61.225.19.71","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=61.225.19.71 ::: serverIP=61.225.19.71 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"61.225.19.71","externalIp":"61.225.19.71","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=61.225.19.71 ::: serverIP=61.225.19.71 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-19T18:51:59.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: entirelysacrament.com messagetype: firewall_action severitycode: 2 fqdn: entirelysacrament.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 61.225.19.71 serverIP: 90.106.244.173 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"140.49.123.75","externalIp":"140.49.123.75","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=140.49.123.75 ::: serverIP=140.49.123.75 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-19T18:51:59.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"140.49.123.75\",\"externalIp\":\"140.49.123.75\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"entirelysacrament.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=140.49.123.75 ::: serverIP=140.49.123.75 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "entirelysacrament.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "entirelysacrament.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "140.49.123.75", "serverIP": "238.121.234.158", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"140.49.123.75","externalIp":"140.49.123.75","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=140.49.123.75 ::: serverIP=140.49.123.75 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"140.49.123.75","externalIp":"140.49.123.75","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=140.49.123.75 ::: serverIP=140.49.123.75 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-19T18:51:59.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: entirelysacrament.com messagetype: firewall_action severitycode: 2 fqdn: entirelysacrament.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 140.49.123.75 serverIP: 238.121.234.158 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"45.163.30.13","externalIp":"45.163.30.13","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=45.163.30.13 ::: serverIP=45.163.30.13 ::: userName=johndoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-19T18:51:59.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"45.163.30.13\",\"externalIp\":\"45.163.30.13\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"limitationvolleyballdejected.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=45.163.30.13 ::: serverIP=45.163.30.13 ::: userName=johndoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "limitationvolleyballdejected.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "limitationvolleyballdejected.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "45.163.30.13", "serverIP": "172.208.167.236", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"45.163.30.13","externalIp":"45.163.30.13","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=45.163.30.13 ::: serverIP=45.163.30.13 ::: userName=johndoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"45.163.30.13","externalIp":"45.163.30.13","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=45.163.30.13 ::: serverIP=45.163.30.13 ::: userName=johndoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-19T18:51:59.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: limitationvolleyballdejected.com messagetype: firewall_action severitycode: 2 fqdn: limitationvolleyballdejected.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 45.163.30.13 serverIP: 172.208.167.236 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"228.11.224.102","externalIp":"228.11.224.102","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=228.11.224.102 ::: serverIP=228.11.224.102 ::: userName=charlie ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-19T18:51:59.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"228.11.224.102\",\"externalIp\":\"228.11.224.102\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"limitationvolleyballdejected.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=228.11.224.102 ::: serverIP=228.11.224.102 ::: userName=charlie ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "limitationvolleyballdejected.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "limitationvolleyballdejected.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "228.11.224.102", "serverIP": "171.184.216.52", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"228.11.224.102","externalIp":"228.11.224.102","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=228.11.224.102 ::: serverIP=228.11.224.102 ::: userName=charlie ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"228.11.224.102","externalIp":"228.11.224.102","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=228.11.224.102 ::: serverIP=228.11.224.102 ::: userName=charlie ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-19T18:51:59.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: limitationvolleyballdejected.com messagetype: firewall_action severitycode: 2 fqdn: limitationvolleyballdejected.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 228.11.224.102 serverIP: 171.184.216.52 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"200.195.26.10","externalIp":"200.195.26.10","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=200.195.26.10 ::: serverIP=200.195.26.10 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-19T18:51:59.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"200.195.26.10\",\"externalIp\":\"200.195.26.10\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"limitationvolleyballdejected.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=200.195.26.10 ::: serverIP=200.195.26.10 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "limitationvolleyballdejected.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "limitationvolleyballdejected.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "200.195.26.10", "serverIP": "101.145.91.70", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"200.195.26.10","externalIp":"200.195.26.10","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=200.195.26.10 ::: serverIP=200.195.26.10 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"200.195.26.10","externalIp":"200.195.26.10","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=200.195.26.10 ::: serverIP=200.195.26.10 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-19T18:51:59.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: limitationvolleyballdejected.com messagetype: firewall_action severitycode: 2 fqdn: limitationvolleyballdejected.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 200.195.26.10 serverIP: 101.145.91.70 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"219.19.46.248","externalIp":"219.19.46.248","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=219.19.46.248 ::: serverIP=219.19.46.248 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-19T18:51:59.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"219.19.46.248\",\"externalIp\":\"219.19.46.248\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"limitationvolleyballdejected.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=219.19.46.248 ::: serverIP=219.19.46.248 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "limitationvolleyballdejected.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "limitationvolleyballdejected.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "219.19.46.248", "serverIP": "246.29.27.249", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"219.19.46.248","externalIp":"219.19.46.248","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=219.19.46.248 ::: serverIP=219.19.46.248 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"219.19.46.248","externalIp":"219.19.46.248","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=219.19.46.248 ::: serverIP=219.19.46.248 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-19T18:51:59.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: limitationvolleyballdejected.com messagetype: firewall_action severitycode: 2 fqdn: limitationvolleyballdejected.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 219.19.46.248 serverIP: 246.29.27.249 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"223.232.46.251","externalIp":"223.232.46.251","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=223.232.46.251 ::: serverIP=223.232.46.251 ::: userName=nighthawk ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-19T18:51:59.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"223.232.46.251\",\"externalIp\":\"223.232.46.251\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"limitationvolleyballdejected.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=223.232.46.251 ::: serverIP=223.232.46.251 ::: userName=nighthawk ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "limitationvolleyballdejected.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "limitationvolleyballdejected.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "223.232.46.251", "serverIP": "228.180.186.210", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"223.232.46.251","externalIp":"223.232.46.251","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=223.232.46.251 ::: serverIP=223.232.46.251 ::: userName=nighthawk ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"223.232.46.251","externalIp":"223.232.46.251","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=223.232.46.251 ::: serverIP=223.232.46.251 ::: userName=nighthawk ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-19T18:51:59.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: limitationvolleyballdejected.com messagetype: firewall_action severitycode: 2 fqdn: limitationvolleyballdejected.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 223.232.46.251 serverIP: 228.180.186.210 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"25.255.195.231","externalIp":"25.255.195.231","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=25.255.195.231 ::: serverIP=25.255.195.231 ::: userName=johndoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-19T18:51:59.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"25.255.195.231\",\"externalIp\":\"25.255.195.231\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"limitationvolleyballdejected.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=25.255.195.231 ::: serverIP=25.255.195.231 ::: userName=johndoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "limitationvolleyballdejected.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "limitationvolleyballdejected.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "25.255.195.231", "serverIP": "210.224.184.60", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"25.255.195.231","externalIp":"25.255.195.231","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=25.255.195.231 ::: serverIP=25.255.195.231 ::: userName=johndoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"25.255.195.231","externalIp":"25.255.195.231","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=25.255.195.231 ::: serverIP=25.255.195.231 ::: userName=johndoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-19T18:51:59.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: limitationvolleyballdejected.com messagetype: firewall_action severitycode: 2 fqdn: limitationvolleyballdejected.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 25.255.195.231 serverIP: 210.224.184.60 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"charlie","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"70.83.194.143"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for charlie, from Bruteforcer 70.83.194.143 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for charlie: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=70.83.194.143 ::: userName=charlie ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch
{ "action": "block", "georegion": "Slovakia, Kosicky kraj, Sobrance", "message": "WitFoo-Artifact ::: tags=[\"title=CPB - Failed Suspicious Login\",\"description=Failed Suspicious Login Has Been Detected\",\"detail=undefined\"] ::: action=blocked ::: message={\"id\":\"26ee5a873e03e852528a150746be6a02\",\"tenant_id\":\"tenant_a41e6a657eef469dbfe7b26dbeeb4827\",\"timestamp\":1693478756231,\"severity\":\"LOW\",\"title\":\"CPB - Failed Suspicious Login\",\"description\":\"Failed Suspicious Login Has Been Detected\",\"type\":\"Footprint\",\"sub_type\":\"Suspicious Login\",\"related_events\":[{\"event_id\":\"d4bfc03b9e6eb2c74092668fe3680c10\",\"cloud_service\":\"Office 365\",\"timestamp\":1693478375000,\"user_id\":\"user_03c4851626f43836c4ce0664cb25daac\",\"user_email\":\"charlie\",\"full_name\":\"Clara Retana\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36\",\"location\":\"Slovakia, Kosicky kraj, Sobrance\",\"geo_location\":[22.181360244750977,48.74454879760742],\"intelligence\":[{\"ip_address\":\"70.83.194.143\"}],\"event_classification\":{\"id\":\"9852\",\"category\":\"Suspicious Login\",\"sub_category\":\"Suspicious Login\",\"threat\":\"Authentication\"},\"meta_data\":{\"extracted_fields\":[{\"129064\":\"[\\\"50\\\"]\"},{\"129065\":\"[\\\"Failure\\\"]\"},{\"129067\":\"[\\\"Suspicious login attempt detected for charlie, from Bruteforcer 70.83.194.143 (LEKOS s.r.o.) \\\\n\\\\nThreat intelligence: \\\\nProofpoint CASB | IP Last Seen On: 2023-08-31\\\\nProofpoint CASB | Categories: Bruteforcer\\\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\\\nIP Enrichments | Domain: lekosonline.sk\\\\n\\\\nBehavioral indicators for charlie: \\\\nRare country score: High (common country: United States)\\\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\\\nRare isp score: High (common isp: AT&T Internet Services)\\\"]\"},{\"129068\":\"[\\\"Low\\\"]\"}]}}]} ::: program=Office 365 ::: clientIP=70.83.194.143 ::: userName=charlie ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "Office 365", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "description=Failed Suspicious Login Has Been Detected", "proofpoint_casb", "title=CPB - Failed Suspicious Login", "detail=undefined", "auth_failure" ], "vendorcode": "9852", "streamName": "proofpoint_casb", "clientIP": "70.83.194.143", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"charlie","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"70.83.194.143"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for charlie, from Bruteforcer 70.83.194.143 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for charlie: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=70.83.194.143 ::: userName=charlie ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch
Product: CASB Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"charlie","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"70.83.194.143"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for charlie, from Bruteforcer 70.83.194.143 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for charlie: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=70.83.194.143 ::: userName=charlie ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called CASB by ProofPoint. The following fields were extracted from the message: action: block georegion: Slovakia, Kosicky kraj, Sobrance messagetype: auth_failure productids: [6] program: Office 365 senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['description=Failed Suspicious Login Has Been Detected', 'proofpoint_casb', 'title=CPB - Failed Suspicious Login', 'detail=undefined', 'auth_failure'] vendorcode: 9852 streamName: proofpoint_casb clientIP: 70.83.194.143 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"janedoe","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"239.94.171.180"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for janedoe, from Bruteforcer 239.94.171.180 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for janedoe: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=239.94.171.180 ::: userName=janedoe ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch
{ "action": "block", "georegion": "Slovakia, Kosicky kraj, Sobrance", "message": "WitFoo-Artifact ::: tags=[\"title=CPB - Failed Suspicious Login\",\"description=Failed Suspicious Login Has Been Detected\",\"detail=undefined\"] ::: action=blocked ::: message={\"id\":\"26ee5a873e03e852528a150746be6a02\",\"tenant_id\":\"tenant_a41e6a657eef469dbfe7b26dbeeb4827\",\"timestamp\":1693478756231,\"severity\":\"LOW\",\"title\":\"CPB - Failed Suspicious Login\",\"description\":\"Failed Suspicious Login Has Been Detected\",\"type\":\"Footprint\",\"sub_type\":\"Suspicious Login\",\"related_events\":[{\"event_id\":\"d4bfc03b9e6eb2c74092668fe3680c10\",\"cloud_service\":\"Office 365\",\"timestamp\":1693478375000,\"user_id\":\"user_03c4851626f43836c4ce0664cb25daac\",\"user_email\":\"janedoe\",\"full_name\":\"Clara Retana\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36\",\"location\":\"Slovakia, Kosicky kraj, Sobrance\",\"geo_location\":[22.181360244750977,48.74454879760742],\"intelligence\":[{\"ip_address\":\"239.94.171.180\"}],\"event_classification\":{\"id\":\"9852\",\"category\":\"Suspicious Login\",\"sub_category\":\"Suspicious Login\",\"threat\":\"Authentication\"},\"meta_data\":{\"extracted_fields\":[{\"129064\":\"[\\\"50\\\"]\"},{\"129065\":\"[\\\"Failure\\\"]\"},{\"129067\":\"[\\\"Suspicious login attempt detected for janedoe, from Bruteforcer 239.94.171.180 (LEKOS s.r.o.) \\\\n\\\\nThreat intelligence: \\\\nProofpoint CASB | IP Last Seen On: 2023-08-31\\\\nProofpoint CASB | Categories: Bruteforcer\\\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\\\nIP Enrichments | Domain: lekosonline.sk\\\\n\\\\nBehavioral indicators for janedoe: \\\\nRare country score: High (common country: United States)\\\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\\\nRare isp score: High (common isp: AT&T Internet Services)\\\"]\"},{\"129068\":\"[\\\"Low\\\"]\"}]}}]} ::: program=Office 365 ::: clientIP=239.94.171.180 ::: userName=janedoe ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "Office 365", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "description=Failed Suspicious Login Has Been Detected", "proofpoint_casb", "title=CPB - Failed Suspicious Login", "detail=undefined", "auth_failure" ], "vendorcode": "9852", "streamName": "proofpoint_casb", "clientIP": "239.94.171.180", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"janedoe","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"239.94.171.180"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for janedoe, from Bruteforcer 239.94.171.180 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for janedoe: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=239.94.171.180 ::: userName=janedoe ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch
Product: CASB Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"janedoe","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"239.94.171.180"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for janedoe, from Bruteforcer 239.94.171.180 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for janedoe: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=239.94.171.180 ::: userName=janedoe ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called CASB by ProofPoint. The following fields were extracted from the message: action: block georegion: Slovakia, Kosicky kraj, Sobrance messagetype: auth_failure productids: [6] program: Office 365 senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['description=Failed Suspicious Login Has Been Detected', 'proofpoint_casb', 'title=CPB - Failed Suspicious Login', 'detail=undefined', 'auth_failure'] vendorcode: 9852 streamName: proofpoint_casb clientIP: 239.94.171.180 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"alice","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"242.65.14.149"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for alice, from Bruteforcer 242.65.14.149 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for alice: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=242.65.14.149 ::: userName=alice ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch
{ "action": "block", "georegion": "Slovakia, Kosicky kraj, Sobrance", "message": "WitFoo-Artifact ::: tags=[\"title=CPB - Failed Suspicious Login\",\"description=Failed Suspicious Login Has Been Detected\",\"detail=undefined\"] ::: action=blocked ::: message={\"id\":\"26ee5a873e03e852528a150746be6a02\",\"tenant_id\":\"tenant_a41e6a657eef469dbfe7b26dbeeb4827\",\"timestamp\":1693478756231,\"severity\":\"LOW\",\"title\":\"CPB - Failed Suspicious Login\",\"description\":\"Failed Suspicious Login Has Been Detected\",\"type\":\"Footprint\",\"sub_type\":\"Suspicious Login\",\"related_events\":[{\"event_id\":\"d4bfc03b9e6eb2c74092668fe3680c10\",\"cloud_service\":\"Office 365\",\"timestamp\":1693478375000,\"user_id\":\"user_03c4851626f43836c4ce0664cb25daac\",\"user_email\":\"alice\",\"full_name\":\"Clara Retana\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36\",\"location\":\"Slovakia, Kosicky kraj, Sobrance\",\"geo_location\":[22.181360244750977,48.74454879760742],\"intelligence\":[{\"ip_address\":\"242.65.14.149\"}],\"event_classification\":{\"id\":\"9852\",\"category\":\"Suspicious Login\",\"sub_category\":\"Suspicious Login\",\"threat\":\"Authentication\"},\"meta_data\":{\"extracted_fields\":[{\"129064\":\"[\\\"50\\\"]\"},{\"129065\":\"[\\\"Failure\\\"]\"},{\"129067\":\"[\\\"Suspicious login attempt detected for alice, from Bruteforcer 242.65.14.149 (LEKOS s.r.o.) \\\\n\\\\nThreat intelligence: \\\\nProofpoint CASB | IP Last Seen On: 2023-08-31\\\\nProofpoint CASB | Categories: Bruteforcer\\\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\\\nIP Enrichments | Domain: lekosonline.sk\\\\n\\\\nBehavioral indicators for alice: \\\\nRare country score: High (common country: United States)\\\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\\\nRare isp score: High (common isp: AT&T Internet Services)\\\"]\"},{\"129068\":\"[\\\"Low\\\"]\"}]}}]} ::: program=Office 365 ::: clientIP=242.65.14.149 ::: userName=alice ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "Office 365", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "description=Failed Suspicious Login Has Been Detected", "proofpoint_casb", "title=CPB - Failed Suspicious Login", "detail=undefined", "auth_failure" ], "vendorcode": "9852", "streamName": "proofpoint_casb", "clientIP": "242.65.14.149", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"alice","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"242.65.14.149"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for alice, from Bruteforcer 242.65.14.149 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for alice: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=242.65.14.149 ::: userName=alice ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch
Product: CASB Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"alice","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"242.65.14.149"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for alice, from Bruteforcer 242.65.14.149 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for alice: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=242.65.14.149 ::: userName=alice ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called CASB by ProofPoint. The following fields were extracted from the message: action: block georegion: Slovakia, Kosicky kraj, Sobrance messagetype: auth_failure productids: [6] program: Office 365 senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['description=Failed Suspicious Login Has Been Detected', 'proofpoint_casb', 'title=CPB - Failed Suspicious Login', 'detail=undefined', 'auth_failure'] vendorcode: 9852 streamName: proofpoint_casb clientIP: 242.65.14.149 userName: alice
Explain this syslog message
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"janedoe","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"101.182.246.65"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for janedoe, from Bruteforcer 101.182.246.65 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for janedoe: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=101.182.246.65 ::: userName=janedoe ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch
{ "action": "block", "georegion": "Slovakia, Kosicky kraj, Sobrance", "message": "WitFoo-Artifact ::: tags=[\"title=CPB - Failed Suspicious Login\",\"description=Failed Suspicious Login Has Been Detected\",\"detail=undefined\"] ::: action=blocked ::: message={\"id\":\"26ee5a873e03e852528a150746be6a02\",\"tenant_id\":\"tenant_a41e6a657eef469dbfe7b26dbeeb4827\",\"timestamp\":1693478756231,\"severity\":\"LOW\",\"title\":\"CPB - Failed Suspicious Login\",\"description\":\"Failed Suspicious Login Has Been Detected\",\"type\":\"Footprint\",\"sub_type\":\"Suspicious Login\",\"related_events\":[{\"event_id\":\"d4bfc03b9e6eb2c74092668fe3680c10\",\"cloud_service\":\"Office 365\",\"timestamp\":1693478375000,\"user_id\":\"user_03c4851626f43836c4ce0664cb25daac\",\"user_email\":\"janedoe\",\"full_name\":\"Clara Retana\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36\",\"location\":\"Slovakia, Kosicky kraj, Sobrance\",\"geo_location\":[22.181360244750977,48.74454879760742],\"intelligence\":[{\"ip_address\":\"101.182.246.65\"}],\"event_classification\":{\"id\":\"9852\",\"category\":\"Suspicious Login\",\"sub_category\":\"Suspicious Login\",\"threat\":\"Authentication\"},\"meta_data\":{\"extracted_fields\":[{\"129064\":\"[\\\"50\\\"]\"},{\"129065\":\"[\\\"Failure\\\"]\"},{\"129067\":\"[\\\"Suspicious login attempt detected for janedoe, from Bruteforcer 101.182.246.65 (LEKOS s.r.o.) \\\\n\\\\nThreat intelligence: \\\\nProofpoint CASB | IP Last Seen On: 2023-08-31\\\\nProofpoint CASB | Categories: Bruteforcer\\\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\\\nIP Enrichments | Domain: lekosonline.sk\\\\n\\\\nBehavioral indicators for janedoe: \\\\nRare country score: High (common country: United States)\\\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\\\nRare isp score: High (common isp: AT&T Internet Services)\\\"]\"},{\"129068\":\"[\\\"Low\\\"]\"}]}}]} ::: program=Office 365 ::: clientIP=101.182.246.65 ::: userName=janedoe ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "Office 365", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "description=Failed Suspicious Login Has Been Detected", "proofpoint_casb", "title=CPB - Failed Suspicious Login", "detail=undefined", "auth_failure" ], "vendorcode": "9852", "streamName": "proofpoint_casb", "clientIP": "101.182.246.65", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"janedoe","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"101.182.246.65"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for janedoe, from Bruteforcer 101.182.246.65 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for janedoe: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=101.182.246.65 ::: userName=janedoe ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch
Product: CASB Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"janedoe","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"101.182.246.65"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for janedoe, from Bruteforcer 101.182.246.65 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for janedoe: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=101.182.246.65 ::: userName=janedoe ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called CASB by ProofPoint. The following fields were extracted from the message: action: block georegion: Slovakia, Kosicky kraj, Sobrance messagetype: auth_failure productids: [6] program: Office 365 senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['description=Failed Suspicious Login Has Been Detected', 'proofpoint_casb', 'title=CPB - Failed Suspicious Login', 'detail=undefined', 'auth_failure'] vendorcode: 9852 streamName: proofpoint_casb clientIP: 101.182.246.65 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"nighthawk","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"14.250.106.133"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for nighthawk, from Bruteforcer 14.250.106.133 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for nighthawk: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=14.250.106.133 ::: userName=nighthawk ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch
{ "action": "block", "georegion": "Slovakia, Kosicky kraj, Sobrance", "message": "WitFoo-Artifact ::: tags=[\"title=CPB - Failed Suspicious Login\",\"description=Failed Suspicious Login Has Been Detected\",\"detail=undefined\"] ::: action=blocked ::: message={\"id\":\"26ee5a873e03e852528a150746be6a02\",\"tenant_id\":\"tenant_a41e6a657eef469dbfe7b26dbeeb4827\",\"timestamp\":1693478756231,\"severity\":\"LOW\",\"title\":\"CPB - Failed Suspicious Login\",\"description\":\"Failed Suspicious Login Has Been Detected\",\"type\":\"Footprint\",\"sub_type\":\"Suspicious Login\",\"related_events\":[{\"event_id\":\"d4bfc03b9e6eb2c74092668fe3680c10\",\"cloud_service\":\"Office 365\",\"timestamp\":1693478375000,\"user_id\":\"user_03c4851626f43836c4ce0664cb25daac\",\"user_email\":\"nighthawk\",\"full_name\":\"Clara Retana\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36\",\"location\":\"Slovakia, Kosicky kraj, Sobrance\",\"geo_location\":[22.181360244750977,48.74454879760742],\"intelligence\":[{\"ip_address\":\"14.250.106.133\"}],\"event_classification\":{\"id\":\"9852\",\"category\":\"Suspicious Login\",\"sub_category\":\"Suspicious Login\",\"threat\":\"Authentication\"},\"meta_data\":{\"extracted_fields\":[{\"129064\":\"[\\\"50\\\"]\"},{\"129065\":\"[\\\"Failure\\\"]\"},{\"129067\":\"[\\\"Suspicious login attempt detected for nighthawk, from Bruteforcer 14.250.106.133 (LEKOS s.r.o.) \\\\n\\\\nThreat intelligence: \\\\nProofpoint CASB | IP Last Seen On: 2023-08-31\\\\nProofpoint CASB | Categories: Bruteforcer\\\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\\\nIP Enrichments | Domain: lekosonline.sk\\\\n\\\\nBehavioral indicators for nighthawk: \\\\nRare country score: High (common country: United States)\\\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\\\nRare isp score: High (common isp: AT&T Internet Services)\\\"]\"},{\"129068\":\"[\\\"Low\\\"]\"}]}}]} ::: program=Office 365 ::: clientIP=14.250.106.133 ::: userName=nighthawk ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "Office 365", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "description=Failed Suspicious Login Has Been Detected", "proofpoint_casb", "title=CPB - Failed Suspicious Login", "detail=undefined", "auth_failure" ], "vendorcode": "9852", "streamName": "proofpoint_casb", "clientIP": "14.250.106.133", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"nighthawk","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"14.250.106.133"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for nighthawk, from Bruteforcer 14.250.106.133 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for nighthawk: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=14.250.106.133 ::: userName=nighthawk ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch
Product: CASB Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"nighthawk","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"14.250.106.133"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for nighthawk, from Bruteforcer 14.250.106.133 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for nighthawk: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=14.250.106.133 ::: userName=nighthawk ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called CASB by ProofPoint. The following fields were extracted from the message: action: block georegion: Slovakia, Kosicky kraj, Sobrance messagetype: auth_failure productids: [6] program: Office 365 senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['description=Failed Suspicious Login Has Been Detected', 'proofpoint_casb', 'title=CPB - Failed Suspicious Login', 'detail=undefined', 'auth_failure'] vendorcode: 9852 streamName: proofpoint_casb clientIP: 14.250.106.133 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"fish","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"140.65.129.209"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for fish, from Bruteforcer 140.65.129.209 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for fish: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=140.65.129.209 ::: userName=fish ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch
{ "action": "block", "georegion": "Slovakia, Kosicky kraj, Sobrance", "message": "WitFoo-Artifact ::: tags=[\"title=CPB - Failed Suspicious Login\",\"description=Failed Suspicious Login Has Been Detected\",\"detail=undefined\"] ::: action=blocked ::: message={\"id\":\"26ee5a873e03e852528a150746be6a02\",\"tenant_id\":\"tenant_a41e6a657eef469dbfe7b26dbeeb4827\",\"timestamp\":1693478756231,\"severity\":\"LOW\",\"title\":\"CPB - Failed Suspicious Login\",\"description\":\"Failed Suspicious Login Has Been Detected\",\"type\":\"Footprint\",\"sub_type\":\"Suspicious Login\",\"related_events\":[{\"event_id\":\"d4bfc03b9e6eb2c74092668fe3680c10\",\"cloud_service\":\"Office 365\",\"timestamp\":1693478375000,\"user_id\":\"user_03c4851626f43836c4ce0664cb25daac\",\"user_email\":\"fish\",\"full_name\":\"Clara Retana\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36\",\"location\":\"Slovakia, Kosicky kraj, Sobrance\",\"geo_location\":[22.181360244750977,48.74454879760742],\"intelligence\":[{\"ip_address\":\"140.65.129.209\"}],\"event_classification\":{\"id\":\"9852\",\"category\":\"Suspicious Login\",\"sub_category\":\"Suspicious Login\",\"threat\":\"Authentication\"},\"meta_data\":{\"extracted_fields\":[{\"129064\":\"[\\\"50\\\"]\"},{\"129065\":\"[\\\"Failure\\\"]\"},{\"129067\":\"[\\\"Suspicious login attempt detected for fish, from Bruteforcer 140.65.129.209 (LEKOS s.r.o.) \\\\n\\\\nThreat intelligence: \\\\nProofpoint CASB | IP Last Seen On: 2023-08-31\\\\nProofpoint CASB | Categories: Bruteforcer\\\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\\\nIP Enrichments | Domain: lekosonline.sk\\\\n\\\\nBehavioral indicators for fish: \\\\nRare country score: High (common country: United States)\\\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\\\nRare isp score: High (common isp: AT&T Internet Services)\\\"]\"},{\"129068\":\"[\\\"Low\\\"]\"}]}}]} ::: program=Office 365 ::: clientIP=140.65.129.209 ::: userName=fish ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "Office 365", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "description=Failed Suspicious Login Has Been Detected", "proofpoint_casb", "title=CPB - Failed Suspicious Login", "detail=undefined", "auth_failure" ], "vendorcode": "9852", "streamName": "proofpoint_casb", "clientIP": "140.65.129.209", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"fish","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"140.65.129.209"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for fish, from Bruteforcer 140.65.129.209 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for fish: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=140.65.129.209 ::: userName=fish ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch
Product: CASB Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"fish","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"140.65.129.209"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for fish, from Bruteforcer 140.65.129.209 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for fish: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=140.65.129.209 ::: userName=fish ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called CASB by ProofPoint. The following fields were extracted from the message: action: block georegion: Slovakia, Kosicky kraj, Sobrance messagetype: auth_failure productids: [6] program: Office 365 senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['description=Failed Suspicious Login Has Been Detected', 'proofpoint_casb', 'title=CPB - Failed Suspicious Login', 'detail=undefined', 'auth_failure'] vendorcode: 9852 streamName: proofpoint_casb clientIP: 140.65.129.209 userName: fish
Explain this syslog message
<134>Oct 14 15:20:07 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1471|1000437|Microsoft IIS WebDAV Long Request Buffer Overflow|8|cn1=36134 cn1Label=Host ID dvc=28.251.22.51 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:A9:C5:C8:B8:43 TrendMicroDsFrameType=IP src=224.210.243.150 dst=28.251.22.51 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=21114 dpt=443 cs2=ACK cs2Label=TCP Flags cnt=1 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags
{ "senderhost": "34.205.5.4", "serverport": 443, "severitylabel": "critical", "tags": [ "TCP Flags:ACK", "rfc3164", "Fragmentation Bits:DF 0", "cef", "DPI Flags:0", "trend micro_deep security agent", "DPI Stream Position:0", "Microsoft IIS WebDAV Long Request Buffer Overflow", "trend micro_deep security agent_Microsoft IIS WebDAV Long Request Buffer Overflow" ], "productids": [ 30 ], "severitycode": 2, "sourceinfo": "unknown", "message": "<134>Oct 14 15:20:07 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1471|1000437|Microsoft IIS WebDAV Long Request Buffer Overflow|8|cn1=36134 cn1Label=Host ID dvc=28.251.22.51 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:A9:C5:C8:B8:43 TrendMicroDsFrameType=IP src=224.210.243.150 dst=28.251.22.51 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=21114 dpt=443 cs2=ACK cs2Label=TCP Flags cnt=1 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags", "localstarttime": "Oct 14 15:20:07", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Microsoft IIS WebDAV Long Request Buffer Overflow", "servermac": "0EF282A10881", "clientmac": "0EA9C5C8B843", "clientport": 21114, "vendorcode": "1000437", "action": "Reset", "protocol": 6, "facilitycode": 16, "streamName": "trend micro_deep security agent", "clientIP": "224.210.243.150", "serverIP": "28.251.22.51" }
Create a JSON artifact from the message
<134>Oct 14 15:20:07 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1471|1000437|Microsoft IIS WebDAV Long Request Buffer Overflow|8|cn1=36134 cn1Label=Host ID dvc=28.251.22.51 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:A9:C5:C8:B8:43 TrendMicroDsFrameType=IP src=224.210.243.150 dst=28.251.22.51 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=21114 dpt=443 cs2=ACK cs2Label=TCP Flags cnt=1 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Oct 14 15:20:07 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1471|1000437|Microsoft IIS WebDAV Long Request Buffer Overflow|8|cn1=36134 cn1Label=Host ID dvc=28.251.22.51 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:A9:C5:C8:B8:43 TrendMicroDsFrameType=IP src=224.210.243.150 dst=28.251.22.51 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=21114 dpt=443 cs2=ACK cs2Label=TCP Flags cnt=1 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.4 serverport: 443 severitylabel: critical tags: ['TCP Flags:ACK', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position:0', 'Microsoft IIS WebDAV Long Request Buffer Overflow', 'trend micro_deep security agent_Microsoft IIS WebDAV Long Request Buffer Overflow'] productids: [30] severitycode: 2 sourceinfo: unknown localstarttime: Oct 14 15:20:07 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Microsoft IIS WebDAV Long Request Buffer Overflow servermac: 0EF282A10881 clientmac: 0EA9C5C8B843 clientport: 21114 vendorcode: 1000437 action: Reset protocol: 6 facilitycode: 16 streamName: trend micro_deep security agent clientIP: 224.210.243.150 serverIP: 28.251.22.51
Explain this syslog message
<134>Oct 14 15:20:07 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1471|1000437|Microsoft IIS WebDAV Long Request Buffer Overflow|8|cn1=36134 cn1Label=Host ID dvc=134.164.252.34 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:A9:C5:C8:B8:43 TrendMicroDsFrameType=IP src=210.120.141.16 dst=134.164.252.34 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=21114 dpt=443 cs2=ACK cs2Label=TCP Flags cnt=1 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags
{ "senderhost": "34.205.5.4", "serverport": 443, "severitylabel": "critical", "tags": [ "TCP Flags:ACK", "rfc3164", "Fragmentation Bits:DF 0", "cef", "DPI Flags:0", "trend micro_deep security agent", "DPI Stream Position:0", "Microsoft IIS WebDAV Long Request Buffer Overflow", "trend micro_deep security agent_Microsoft IIS WebDAV Long Request Buffer Overflow" ], "productids": [ 30 ], "severitycode": 2, "sourceinfo": "unknown", "message": "<134>Oct 14 15:20:07 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1471|1000437|Microsoft IIS WebDAV Long Request Buffer Overflow|8|cn1=36134 cn1Label=Host ID dvc=134.164.252.34 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:A9:C5:C8:B8:43 TrendMicroDsFrameType=IP src=210.120.141.16 dst=134.164.252.34 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=21114 dpt=443 cs2=ACK cs2Label=TCP Flags cnt=1 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags", "localstarttime": "Oct 14 15:20:07", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Microsoft IIS WebDAV Long Request Buffer Overflow", "servermac": "0EF282A10881", "clientmac": "0EA9C5C8B843", "clientport": 21114, "vendorcode": "1000437", "action": "Reset", "protocol": 6, "facilitycode": 16, "streamName": "trend micro_deep security agent", "clientIP": "210.120.141.16", "serverIP": "134.164.252.34" }
Create a JSON artifact from the message
<134>Oct 14 15:20:07 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1471|1000437|Microsoft IIS WebDAV Long Request Buffer Overflow|8|cn1=36134 cn1Label=Host ID dvc=134.164.252.34 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:A9:C5:C8:B8:43 TrendMicroDsFrameType=IP src=210.120.141.16 dst=134.164.252.34 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=21114 dpt=443 cs2=ACK cs2Label=TCP Flags cnt=1 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Oct 14 15:20:07 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1471|1000437|Microsoft IIS WebDAV Long Request Buffer Overflow|8|cn1=36134 cn1Label=Host ID dvc=134.164.252.34 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:A9:C5:C8:B8:43 TrendMicroDsFrameType=IP src=210.120.141.16 dst=134.164.252.34 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=21114 dpt=443 cs2=ACK cs2Label=TCP Flags cnt=1 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.4 serverport: 443 severitylabel: critical tags: ['TCP Flags:ACK', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position:0', 'Microsoft IIS WebDAV Long Request Buffer Overflow', 'trend micro_deep security agent_Microsoft IIS WebDAV Long Request Buffer Overflow'] productids: [30] severitycode: 2 sourceinfo: unknown localstarttime: Oct 14 15:20:07 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Microsoft IIS WebDAV Long Request Buffer Overflow servermac: 0EF282A10881 clientmac: 0EA9C5C8B843 clientport: 21114 vendorcode: 1000437 action: Reset protocol: 6 facilitycode: 16 streamName: trend micro_deep security agent clientIP: 210.120.141.16 serverIP: 134.164.252.34
Explain this syslog message
WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"128.205.167.144","externalIp":"77.32.227.67","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel6.carcgl.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=128.205.167.144 ::: serverIP=77.32.227.67 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "kingdel6.carcgl.com", "message": "WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"128.205.167.144\",\"externalIp\":\"77.32.227.67\",\"categories\":[\"DNS Tunneling VPN\"],\"tags\":[],\"destination\":\"kingdel6.carcgl.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-15T11:48:14.000Z\"} ::: clientIP=128.205.167.144 ::: serverIP=77.32.227.67 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "kingdel6.carcgl.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-15T11:48:14.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "DNS Tunneling VPN", "streamName": "OpenDNS Detection", "clientIP": "128.205.167.144", "serverIP": "77.32.227.67", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"128.205.167.144","externalIp":"77.32.227.67","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel6.carcgl.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=128.205.167.144 ::: serverIP=77.32.227.67 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"128.205.167.144","externalIp":"77.32.227.67","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel6.carcgl.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=128.205.167.144 ::: serverIP=77.32.227.67 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: kingdel6.carcgl.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: kingdel6.carcgl.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-15T11:48:14.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: DNS Tunneling VPN streamName: OpenDNS Detection clientIP: 128.205.167.144 serverIP: 77.32.227.67 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"196.100.136.2","externalIp":"186.116.169.76","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel6.carcgl.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=196.100.136.2 ::: serverIP=186.116.169.76 ::: userName=johndoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "kingdel6.carcgl.com", "message": "WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"196.100.136.2\",\"externalIp\":\"186.116.169.76\",\"categories\":[\"DNS Tunneling VPN\"],\"tags\":[],\"destination\":\"kingdel6.carcgl.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-15T11:48:14.000Z\"} ::: clientIP=196.100.136.2 ::: serverIP=186.116.169.76 ::: userName=johndoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "kingdel6.carcgl.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-15T11:48:14.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "DNS Tunneling VPN", "streamName": "OpenDNS Detection", "clientIP": "196.100.136.2", "serverIP": "186.116.169.76", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"196.100.136.2","externalIp":"186.116.169.76","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel6.carcgl.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=196.100.136.2 ::: serverIP=186.116.169.76 ::: userName=johndoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"196.100.136.2","externalIp":"186.116.169.76","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel6.carcgl.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=196.100.136.2 ::: serverIP=186.116.169.76 ::: userName=johndoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: kingdel6.carcgl.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: kingdel6.carcgl.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-15T11:48:14.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: DNS Tunneling VPN streamName: OpenDNS Detection clientIP: 196.100.136.2 serverIP: 186.116.169.76 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=kingdel.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"105.136.165.95","externalIp":"67.23.95.143","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel.carcgl.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=105.136.165.95 ::: serverIP=67.23.95.143 ::: userName=charlie ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel.carcgl.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "kingdel.carcgl.com", "message": "WitFoo-Artifact ::: fqdn=kingdel.carcgl.com ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"105.136.165.95\",\"externalIp\":\"67.23.95.143\",\"categories\":[\"DNS Tunneling VPN\"],\"tags\":[],\"destination\":\"kingdel.carcgl.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-15T11:48:14.000Z\"} ::: clientIP=105.136.165.95 ::: serverIP=67.23.95.143 ::: userName=charlie ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel.carcgl.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "kingdel.carcgl.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-15T11:48:14.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "DNS Tunneling VPN", "streamName": "OpenDNS Detection", "clientIP": "105.136.165.95", "serverIP": "67.23.95.143", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=kingdel.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"105.136.165.95","externalIp":"67.23.95.143","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel.carcgl.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=105.136.165.95 ::: serverIP=67.23.95.143 ::: userName=charlie ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel.carcgl.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=kingdel.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"105.136.165.95","externalIp":"67.23.95.143","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel.carcgl.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=105.136.165.95 ::: serverIP=67.23.95.143 ::: userName=charlie ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel.carcgl.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: kingdel.carcgl.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: kingdel.carcgl.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-15T11:48:14.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: DNS Tunneling VPN streamName: OpenDNS Detection clientIP: 105.136.165.95 serverIP: 67.23.95.143 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=kingdel.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"120.201.62.23","externalIp":"126.251.39.205","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel.carcgl.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=120.201.62.23 ::: serverIP=126.251.39.205 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel.carcgl.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "kingdel.carcgl.com", "message": "WitFoo-Artifact ::: fqdn=kingdel.carcgl.com ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"120.201.62.23\",\"externalIp\":\"126.251.39.205\",\"categories\":[\"DNS Tunneling VPN\"],\"tags\":[],\"destination\":\"kingdel.carcgl.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-15T11:48:14.000Z\"} ::: clientIP=120.201.62.23 ::: serverIP=126.251.39.205 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel.carcgl.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "kingdel.carcgl.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-15T11:48:14.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "DNS Tunneling VPN", "streamName": "OpenDNS Detection", "clientIP": "120.201.62.23", "serverIP": "126.251.39.205", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=kingdel.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"120.201.62.23","externalIp":"126.251.39.205","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel.carcgl.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=120.201.62.23 ::: serverIP=126.251.39.205 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel.carcgl.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=kingdel.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"120.201.62.23","externalIp":"126.251.39.205","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel.carcgl.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=120.201.62.23 ::: serverIP=126.251.39.205 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel.carcgl.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: kingdel.carcgl.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: kingdel.carcgl.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-15T11:48:14.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: DNS Tunneling VPN streamName: OpenDNS Detection clientIP: 120.201.62.23 serverIP: 126.251.39.205 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"78.131.177.50","externalIp":"226.109.224.255","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel6.carcgl.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=78.131.177.50 ::: serverIP=226.109.224.255 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "kingdel6.carcgl.com", "message": "WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"78.131.177.50\",\"externalIp\":\"226.109.224.255\",\"categories\":[\"DNS Tunneling VPN\"],\"tags\":[],\"destination\":\"kingdel6.carcgl.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-15T11:48:14.000Z\"} ::: clientIP=78.131.177.50 ::: serverIP=226.109.224.255 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "kingdel6.carcgl.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-15T11:48:14.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "DNS Tunneling VPN", "streamName": "OpenDNS Detection", "clientIP": "78.131.177.50", "serverIP": "226.109.224.255", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"78.131.177.50","externalIp":"226.109.224.255","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel6.carcgl.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=78.131.177.50 ::: serverIP=226.109.224.255 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message