input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"5.109.80.145","externalIp":"29.103.123.36","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=5.109.80.145 ::: serverIP=29.103.123.36 ::: userName=fish ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=genzfeeds.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"5.109.80.145","externalIp":"29.103.123.36","categories":["Forums/Message boards","Phishing","Online Communities"],"tags":[],"destination":"genzfeeds.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-03T14:04:10.000Z"} ::: clientIP=5.109.80.145 ::: serverIP=29.103.123.36 ::: userName=fish ::: created_at=2022-10-03T14:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Forums/Message boardsPhishingOnline Communities ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-03T14:04:10.000Z ::: serverHostname=genzfeeds.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: genzfeeds.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: genzfeeds.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-03T14:04:10.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Forums/Message boardsPhishingOnline Communities
streamName: OpenDNS Detection
clientIP: 5.109.80.145
serverIP: 29.103.123.36
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"fish","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"fish"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"fish","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"221.209.182.76","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4UMBRELLADiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTUMBRELLAB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTUMBRELLAB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"221.209.182.76","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=221.209.182.76 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=User login to Okta\",\"userDisplay=Dayna Herron | Loan Processing Dept\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u2jhpd38G7OC3Jz697\",\"status\":\"ACTIVE\",\"created\":\"2022-09-27T14:53:34.000Z\",\"activated\":\"2022-09-27T14:53:34.000Z\",\"statusChanged\":\"2023-09-13T15:02:20.000Z\",\"lastLogin\":\"2023-10-31T14:40:40.000Z\",\"lastUpdated\":\"2023-09-13T15:02:20.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"lastName\":\"Herron\",\"zipCode\":\"92108\",\"city\":\"San Diego\",\"displayName\":\"Dayna Herron\",\"secondEmail\":null,\"title\":\"Senior Loan Administrator\",\"login\":\"fish\",\"firstName\":\"Dayna\",\"primaryPhone\":\"(760) 759-1713\",\"immutableID\":\"NgxQN2IySUqPCQGtoILdUw==\",\"mobilePhone\":null,\"countryCode\":\"US\",\"state\":\"CA\",\"department\":\"Loan Processing Dept\",\"email\":\"fish\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697\"},\"resetFactors\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u2jhpd38G7OC3Jz697\",\"type\":\"User\",\"alternateId\":\"fish\",\"displayName\":\"Dayna Herron\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko\",\"os\":\"Windows 8\",\"browser\":\"IE11\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":null,\"ipAddress\":\"221.209.182.76\",\"geographicalContext\":{\"city\":\"Winchester\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92596\",\"geolocation\":{\"lat\":33.6206,\"lon\":-117.0867}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxsc6tTEcKTkil6dWISMF4Hw\"},\"displayMessage\":\"User login to Okta\",\"eventType\":\"user.session.start\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"INVALID_CREDENTIALS\"},\"published\":\"2023-10-31T13:56:38.064Z\",\"securityContext\":{\"asNumber\":5650,\"asOrg\":\"frontier communications\",\"isp\":\"frontier communications of america inc.\",\"domain\":\".\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZUEHR82y0nSbx83djtcx4UMBRELLADiw\",\"deviceFingerprint\":\"9beff0acfec08b61e5955b8d7f792041\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.11.2\",\"requestId\":\"ZUEHlWiXn-Elf7oEyN5WTUMBRELLAB8s\",\"dtHash\":\"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\",\"logOnlySecurityData\":\"{\\\"risk\\\":{\\\"level\\\":\\\"LOW\\\"},\\\"behaviors\\\":{\\\"New Geo-Location\\\":\\\"NEGATIVE\\\",\\\"New Device\\\":\\\"NEGATIVE\\\",\\\"New IP\\\":\\\"NEGATIVE\\\",\\\"New State\\\":\\\"NEGATIVE\\\",\\\"New Country\\\":\\\"NEGATIVE\\\",\\\"Velocity\\\":\\\"NEGATIVE\\\",\\\"New City\\\":\\\"NEGATIVE\\\"}}\"}},\"legacyEventType\":\"core.user_auth.login_failed\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZUEHlWiXn-Elf7oEyN5WTUMBRELLAB8s\",\"detail\":{}},\"uuid\":\"4f90b398-77f5-11ee-adff-b9c95a9b9549\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"221.209.182.76\",\"geographicalContext\":{\"city\":\"Winchester\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92596\",\"geolocation\":{\"lat\":33.6206,\"lon\":-117.0867}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"laeaevaskHK7GVXYA696\",\"type\":\"AuthenticatorEnrollment\",\"alternateId\":\"unknown\",\"displayName\":\"Password\",\"detailEntry\":null},{\"id\":\"0oa29uf7l9ectzUsK697\",\"type\":\"AppInstance\",\"alternateId\":\"Palo Alto Networks - GlobalProtect\",\"displayName\":\"Palo Alto Networks - GlobalProtect\",\"detailEntry\":null}]}} ::: program=IE11 ::: clientIP=221.209.182.76 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "IE11",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 3,
"severitylabel": "error",
"sourceinfo": "unknown",
"tags": [
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"userDisplay=Dayna Herron | Loan Processing Dept",
"description=User login to Okta",
"auth_failure"
],
"vendorcode": "user.session.start",
"streamName": "Okta",
"clientIP": "221.209.182.76",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"fish","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"fish"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"fish","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"221.209.182.76","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4UMBRELLADiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTUMBRELLAB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTUMBRELLAB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"221.209.182.76","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=221.209.182.76 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"fish","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"fish"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"fish","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"221.209.182.76","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4UMBRELLADiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTUMBRELLAB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTUMBRELLAB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"221.209.182.76","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=221.209.182.76 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: IE11
senderhost: kafka.precinct
sensitivity: normal
severitycode: 3
severitylabel: error
sourceinfo: unknown
tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'userDisplay=Dayna Herron | Loan Processing Dept', 'description=User login to Okta', 'auth_failure']
vendorcode: user.session.start
streamName: Okta
clientIP: 221.209.182.76
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"fish","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"fish"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://stark.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://stark.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"fish","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"181.175.174.248","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4STARKDiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTSTARKB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTSTARKB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"181.175.174.248","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=181.175.174.248 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=User login to Okta\",\"userDisplay=Dayna Herron | Loan Processing Dept\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u2jhpd38G7OC3Jz697\",\"status\":\"ACTIVE\",\"created\":\"2022-09-27T14:53:34.000Z\",\"activated\":\"2022-09-27T14:53:34.000Z\",\"statusChanged\":\"2023-09-13T15:02:20.000Z\",\"lastLogin\":\"2023-10-31T14:40:40.000Z\",\"lastUpdated\":\"2023-09-13T15:02:20.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"lastName\":\"Herron\",\"zipCode\":\"92108\",\"city\":\"San Diego\",\"displayName\":\"Dayna Herron\",\"secondEmail\":null,\"title\":\"Senior Loan Administrator\",\"login\":\"fish\",\"firstName\":\"Dayna\",\"primaryPhone\":\"(760) 759-1713\",\"immutableID\":\"NgxQN2IySUqPCQGtoILdUw==\",\"mobilePhone\":null,\"countryCode\":\"US\",\"state\":\"CA\",\"department\":\"Loan Processing Dept\",\"email\":\"fish\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://stark.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697\"},\"resetFactors\":{\"href\":\"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://stark.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u2jhpd38G7OC3Jz697\",\"type\":\"User\",\"alternateId\":\"fish\",\"displayName\":\"Dayna Herron\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko\",\"os\":\"Windows 8\",\"browser\":\"IE11\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":null,\"ipAddress\":\"181.175.174.248\",\"geographicalContext\":{\"city\":\"Winchester\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92596\",\"geolocation\":{\"lat\":33.6206,\"lon\":-117.0867}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxsc6tTEcKTkil6dWISMF4Hw\"},\"displayMessage\":\"User login to Okta\",\"eventType\":\"user.session.start\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"INVALID_CREDENTIALS\"},\"published\":\"2023-10-31T13:56:38.064Z\",\"securityContext\":{\"asNumber\":5650,\"asOrg\":\"frontier communications\",\"isp\":\"frontier communications of america inc.\",\"domain\":\".\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZUEHR82y0nSbx83djtcx4STARKDiw\",\"deviceFingerprint\":\"9beff0acfec08b61e5955b8d7f792041\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.11.2\",\"requestId\":\"ZUEHlWiXn-Elf7oEyN5WTSTARKB8s\",\"dtHash\":\"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\",\"logOnlySecurityData\":\"{\\\"risk\\\":{\\\"level\\\":\\\"LOW\\\"},\\\"behaviors\\\":{\\\"New Geo-Location\\\":\\\"NEGATIVE\\\",\\\"New Device\\\":\\\"NEGATIVE\\\",\\\"New IP\\\":\\\"NEGATIVE\\\",\\\"New State\\\":\\\"NEGATIVE\\\",\\\"New Country\\\":\\\"NEGATIVE\\\",\\\"Velocity\\\":\\\"NEGATIVE\\\",\\\"New City\\\":\\\"NEGATIVE\\\"}}\"}},\"legacyEventType\":\"core.user_auth.login_failed\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZUEHlWiXn-Elf7oEyN5WTSTARKB8s\",\"detail\":{}},\"uuid\":\"4f90b398-77f5-11ee-adff-b9c95a9b9549\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"181.175.174.248\",\"geographicalContext\":{\"city\":\"Winchester\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92596\",\"geolocation\":{\"lat\":33.6206,\"lon\":-117.0867}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"laeaevaskHK7GVXYA696\",\"type\":\"AuthenticatorEnrollment\",\"alternateId\":\"unknown\",\"displayName\":\"Password\",\"detailEntry\":null},{\"id\":\"0oa29uf7l9ectzUsK697\",\"type\":\"AppInstance\",\"alternateId\":\"Palo Alto Networks - GlobalProtect\",\"displayName\":\"Palo Alto Networks - GlobalProtect\",\"detailEntry\":null}]}} ::: program=IE11 ::: clientIP=181.175.174.248 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "IE11",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 3,
"severitylabel": "error",
"sourceinfo": "unknown",
"tags": [
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"userDisplay=Dayna Herron | Loan Processing Dept",
"description=User login to Okta",
"auth_failure"
],
"vendorcode": "user.session.start",
"streamName": "Okta",
"clientIP": "181.175.174.248",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"fish","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"fish"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://stark.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://stark.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"fish","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"181.175.174.248","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4STARKDiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTSTARKB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTSTARKB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"181.175.174.248","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=181.175.174.248 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"fish","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"fish"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://stark.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://stark.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://stark.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"fish","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"181.175.174.248","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4STARKDiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTSTARKB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTSTARKB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"181.175.174.248","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=181.175.174.248 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: IE11
senderhost: kafka.precinct
sensitivity: normal
severitycode: 3
severitylabel: error
sourceinfo: unknown
tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'userDisplay=Dayna Herron | Loan Processing Dept', 'description=User login to Okta', 'auth_failure']
vendorcode: user.session.start
streamName: Okta
clientIP: 181.175.174.248
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"nighthawk","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"nighthawk"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"nighthawk","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"80.138.47.134","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4OSCORPDiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTOSCORPB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTOSCORPB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"80.138.47.134","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=80.138.47.134 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=User login to Okta\",\"userDisplay=Dayna Herron | Loan Processing Dept\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u2jhpd38G7OC3Jz697\",\"status\":\"ACTIVE\",\"created\":\"2022-09-27T14:53:34.000Z\",\"activated\":\"2022-09-27T14:53:34.000Z\",\"statusChanged\":\"2023-09-13T15:02:20.000Z\",\"lastLogin\":\"2023-10-31T14:40:40.000Z\",\"lastUpdated\":\"2023-09-13T15:02:20.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"lastName\":\"Herron\",\"zipCode\":\"92108\",\"city\":\"San Diego\",\"displayName\":\"Dayna Herron\",\"secondEmail\":null,\"title\":\"Senior Loan Administrator\",\"login\":\"nighthawk\",\"firstName\":\"Dayna\",\"primaryPhone\":\"(760) 759-1713\",\"immutableID\":\"NgxQN2IySUqPCQGtoILdUw==\",\"mobilePhone\":null,\"countryCode\":\"US\",\"state\":\"CA\",\"department\":\"Loan Processing Dept\",\"email\":\"nighthawk\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697\"},\"resetFactors\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u2jhpd38G7OC3Jz697\",\"type\":\"User\",\"alternateId\":\"nighthawk\",\"displayName\":\"Dayna Herron\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko\",\"os\":\"Windows 8\",\"browser\":\"IE11\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":null,\"ipAddress\":\"80.138.47.134\",\"geographicalContext\":{\"city\":\"Winchester\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92596\",\"geolocation\":{\"lat\":33.6206,\"lon\":-117.0867}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxsc6tTEcKTkil6dWISMF4Hw\"},\"displayMessage\":\"User login to Okta\",\"eventType\":\"user.session.start\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"INVALID_CREDENTIALS\"},\"published\":\"2023-10-31T13:56:38.064Z\",\"securityContext\":{\"asNumber\":5650,\"asOrg\":\"frontier communications\",\"isp\":\"frontier communications of america inc.\",\"domain\":\".\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZUEHR82y0nSbx83djtcx4OSCORPDiw\",\"deviceFingerprint\":\"9beff0acfec08b61e5955b8d7f792041\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.11.2\",\"requestId\":\"ZUEHlWiXn-Elf7oEyN5WTOSCORPB8s\",\"dtHash\":\"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\",\"logOnlySecurityData\":\"{\\\"risk\\\":{\\\"level\\\":\\\"LOW\\\"},\\\"behaviors\\\":{\\\"New Geo-Location\\\":\\\"NEGATIVE\\\",\\\"New Device\\\":\\\"NEGATIVE\\\",\\\"New IP\\\":\\\"NEGATIVE\\\",\\\"New State\\\":\\\"NEGATIVE\\\",\\\"New Country\\\":\\\"NEGATIVE\\\",\\\"Velocity\\\":\\\"NEGATIVE\\\",\\\"New City\\\":\\\"NEGATIVE\\\"}}\"}},\"legacyEventType\":\"core.user_auth.login_failed\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZUEHlWiXn-Elf7oEyN5WTOSCORPB8s\",\"detail\":{}},\"uuid\":\"4f90b398-77f5-11ee-adff-b9c95a9b9549\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"80.138.47.134\",\"geographicalContext\":{\"city\":\"Winchester\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92596\",\"geolocation\":{\"lat\":33.6206,\"lon\":-117.0867}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"laeaevaskHK7GVXYA696\",\"type\":\"AuthenticatorEnrollment\",\"alternateId\":\"unknown\",\"displayName\":\"Password\",\"detailEntry\":null},{\"id\":\"0oa29uf7l9ectzUsK697\",\"type\":\"AppInstance\",\"alternateId\":\"Palo Alto Networks - GlobalProtect\",\"displayName\":\"Palo Alto Networks - GlobalProtect\",\"detailEntry\":null}]}} ::: program=IE11 ::: clientIP=80.138.47.134 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "IE11",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 3,
"severitylabel": "error",
"sourceinfo": "unknown",
"tags": [
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"userDisplay=Dayna Herron | Loan Processing Dept",
"description=User login to Okta",
"auth_failure"
],
"vendorcode": "user.session.start",
"streamName": "Okta",
"clientIP": "80.138.47.134",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"nighthawk","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"nighthawk"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"nighthawk","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"80.138.47.134","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4OSCORPDiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTOSCORPB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTOSCORPB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"80.138.47.134","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=80.138.47.134 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"nighthawk","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"nighthawk"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"nighthawk","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"80.138.47.134","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4OSCORPDiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTOSCORPB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTOSCORPB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"80.138.47.134","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=80.138.47.134 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: IE11
senderhost: kafka.precinct
sensitivity: normal
severitycode: 3
severitylabel: error
sourceinfo: unknown
tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'userDisplay=Dayna Herron | Loan Processing Dept', 'description=User login to Okta', 'auth_failure']
vendorcode: user.session.start
streamName: Okta
clientIP: 80.138.47.134
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"janedoe","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"janedoe"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"janedoe","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"0.57.176.213","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4ACMEDiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTACMEB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTACMEB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"0.57.176.213","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=0.57.176.213 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=User login to Okta\",\"userDisplay=Dayna Herron | Loan Processing Dept\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u2jhpd38G7OC3Jz697\",\"status\":\"ACTIVE\",\"created\":\"2022-09-27T14:53:34.000Z\",\"activated\":\"2022-09-27T14:53:34.000Z\",\"statusChanged\":\"2023-09-13T15:02:20.000Z\",\"lastLogin\":\"2023-10-31T14:40:40.000Z\",\"lastUpdated\":\"2023-09-13T15:02:20.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"lastName\":\"Herron\",\"zipCode\":\"92108\",\"city\":\"San Diego\",\"displayName\":\"Dayna Herron\",\"secondEmail\":null,\"title\":\"Senior Loan Administrator\",\"login\":\"janedoe\",\"firstName\":\"Dayna\",\"primaryPhone\":\"(760) 759-1713\",\"immutableID\":\"NgxQN2IySUqPCQGtoILdUw==\",\"mobilePhone\":null,\"countryCode\":\"US\",\"state\":\"CA\",\"department\":\"Loan Processing Dept\",\"email\":\"janedoe\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697\"},\"resetFactors\":{\"href\":\"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u2jhpd38G7OC3Jz697\",\"type\":\"User\",\"alternateId\":\"janedoe\",\"displayName\":\"Dayna Herron\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko\",\"os\":\"Windows 8\",\"browser\":\"IE11\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":null,\"ipAddress\":\"0.57.176.213\",\"geographicalContext\":{\"city\":\"Winchester\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92596\",\"geolocation\":{\"lat\":33.6206,\"lon\":-117.0867}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxsc6tTEcKTkil6dWISMF4Hw\"},\"displayMessage\":\"User login to Okta\",\"eventType\":\"user.session.start\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"INVALID_CREDENTIALS\"},\"published\":\"2023-10-31T13:56:38.064Z\",\"securityContext\":{\"asNumber\":5650,\"asOrg\":\"frontier communications\",\"isp\":\"frontier communications of america inc.\",\"domain\":\".\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZUEHR82y0nSbx83djtcx4ACMEDiw\",\"deviceFingerprint\":\"9beff0acfec08b61e5955b8d7f792041\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.11.2\",\"requestId\":\"ZUEHlWiXn-Elf7oEyN5WTACMEB8s\",\"dtHash\":\"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\",\"logOnlySecurityData\":\"{\\\"risk\\\":{\\\"level\\\":\\\"LOW\\\"},\\\"behaviors\\\":{\\\"New Geo-Location\\\":\\\"NEGATIVE\\\",\\\"New Device\\\":\\\"NEGATIVE\\\",\\\"New IP\\\":\\\"NEGATIVE\\\",\\\"New State\\\":\\\"NEGATIVE\\\",\\\"New Country\\\":\\\"NEGATIVE\\\",\\\"Velocity\\\":\\\"NEGATIVE\\\",\\\"New City\\\":\\\"NEGATIVE\\\"}}\"}},\"legacyEventType\":\"core.user_auth.login_failed\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZUEHlWiXn-Elf7oEyN5WTACMEB8s\",\"detail\":{}},\"uuid\":\"4f90b398-77f5-11ee-adff-b9c95a9b9549\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"0.57.176.213\",\"geographicalContext\":{\"city\":\"Winchester\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92596\",\"geolocation\":{\"lat\":33.6206,\"lon\":-117.0867}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"laeaevaskHK7GVXYA696\",\"type\":\"AuthenticatorEnrollment\",\"alternateId\":\"unknown\",\"displayName\":\"Password\",\"detailEntry\":null},{\"id\":\"0oa29uf7l9ectzUsK697\",\"type\":\"AppInstance\",\"alternateId\":\"Palo Alto Networks - GlobalProtect\",\"displayName\":\"Palo Alto Networks - GlobalProtect\",\"detailEntry\":null}]}} ::: program=IE11 ::: clientIP=0.57.176.213 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "IE11",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 3,
"severitylabel": "error",
"sourceinfo": "unknown",
"tags": [
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"userDisplay=Dayna Herron | Loan Processing Dept",
"description=User login to Okta",
"auth_failure"
],
"vendorcode": "user.session.start",
"streamName": "Okta",
"clientIP": "0.57.176.213",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"janedoe","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"janedoe"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"janedoe","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"0.57.176.213","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4ACMEDiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTACMEB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTACMEB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"0.57.176.213","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=0.57.176.213 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Dayna Herron | Loan Processing Dept","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhpd38G7OC3Jz697","status":"ACTIVE","created":"2022-09-27T14:53:34.000Z","activated":"2022-09-27T14:53:34.000Z","statusChanged":"2023-09-13T15:02:20.000Z","lastLogin":"2023-10-31T14:40:40.000Z","lastUpdated":"2023-09-13T15:02:20.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Herron","zipCode":"92108","city":"San Diego","displayName":"Dayna Herron","secondEmail":null,"title":"Senior Loan Administrator","login":"janedoe","firstName":"Dayna","primaryPhone":"(760) 759-1713","immutableID":"NgxQN2IySUqPCQGtoILdUw==","mobilePhone":null,"countryCode":"US","state":"CA","department":"Loan Processing Dept","email":"janedoe"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u2jhpd38G7OC3Jz697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhpd38G7OC3Jz697","type":"User","alternateId":"janedoe","displayName":"Dayna Herron","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"0.57.176.213","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxsc6tTEcKTkil6dWISMF4Hw"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-10-31T13:56:38.064Z","securityContext":{"asNumber":5650,"asOrg":"frontier communications","isp":"frontier communications of america inc.","domain":".","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZUEHR82y0nSbx83djtcx4ACMEDiw","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.11.2","requestId":"ZUEHlWiXn-Elf7oEyN5WTACMEB8s","dtHash":"51f6657cc8023c7892ad66d5382e81a9c541ea2657ead9ef5cef3ccd3ecf2a98","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZUEHlWiXn-Elf7oEyN5WTACMEB8s","detail":{}},"uuid":"4f90b398-77f5-11ee-adff-b9c95a9b9549","version":"0","request":{"ipChain":[{"ip":"0.57.176.213","geographicalContext":{"city":"Winchester","state":"California","country":"United States","postalCode":"92596","geolocation":{"lat":33.6206,"lon":-117.0867}},"version":"V4","source":null}]},"target":[{"id":"laeaevaskHK7GVXYA696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=0.57.176.213 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-10-31T13:56:38.064Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: IE11
senderhost: kafka.precinct
sensitivity: normal
severitycode: 3
severitylabel: error
sourceinfo: unknown
tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'userDisplay=Dayna Herron | Loan Processing Dept', 'description=User login to Okta', 'auth_failure']
vendorcode: user.session.start
streamName: Okta
clientIP: 0.57.176.213
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t35.250.206.226\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"Nordc-DC-03.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"35.250.206.226","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53321,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-14T01:13:07.863Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-14T01:13:08.811Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.wayne.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-BIOSE\\n\\tSource Network Address:\\t35.250.206.226\\n\\tSource Port:\\t\\t53321\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"Nordc-DC-03.wayne.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.wayne.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"35.250.206.226\",\"IpPort\":\"53321\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-BIOSE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":3588}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1316377383,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "Nordc-DC-03.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "1316377383",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "35.250.206.226",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t35.250.206.226\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"Nordc-DC-03.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"35.250.206.226","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t35.250.206.226\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"Nordc-DC-03.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"35.250.206.226","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53321
messagetype: auth_failure
productids: [6]
senderhost: Nordc-DC-03.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 1316377383
streamName: microsoft-windows-security-auditing
clientIP: 35.250.206.226
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t217.229.203.31\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"Nordc-DC-03.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"217.229.203.31","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53321,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-14T01:13:07.863Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-14T01:13:08.811Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.wayne.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-BIOSE\\n\\tSource Network Address:\\t217.229.203.31\\n\\tSource Port:\\t\\t53321\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"Nordc-DC-03.wayne.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.wayne.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"217.229.203.31\",\"IpPort\":\"53321\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-BIOSE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":3588}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1316377383,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "Nordc-DC-03.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "1316377383",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "217.229.203.31",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t217.229.203.31\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"Nordc-DC-03.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"217.229.203.31","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t217.229.203.31\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"Nordc-DC-03.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"217.229.203.31","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53321
messagetype: auth_failure
productids: [6]
senderhost: Nordc-DC-03.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 1316377383
streamName: microsoft-windows-security-auditing
clientIP: 217.229.203.31
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t108.220.10.232\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"108.220.10.232","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53321,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-14T01:13:07.863Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-14T01:13:08.811Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-BIOSE\\n\\tSource Network Address:\\t108.220.10.232\\n\\tSource Port:\\t\\t53321\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"Nordc-DC-03.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.umbrella.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"108.220.10.232\",\"IpPort\":\"53321\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-BIOSE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":3588}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1316377383,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "Nordc-DC-03.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "1316377383",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "108.220.10.232",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t108.220.10.232\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"108.220.10.232","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t108.220.10.232\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"108.220.10.232","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53321
messagetype: auth_failure
productids: [6]
senderhost: Nordc-DC-03.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 1316377383
streamName: microsoft-windows-security-auditing
clientIP: 108.220.10.232
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t23.24.161.230\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"Nordc-DC-03.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"23.24.161.230","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53321,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-14T01:13:07.863Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-14T01:13:08.811Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-BIOSE\\n\\tSource Network Address:\\t23.24.161.230\\n\\tSource Port:\\t\\t53321\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"Nordc-DC-03.stark.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"23.24.161.230\",\"IpPort\":\"53321\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-BIOSE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":3588}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1316377383,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "Nordc-DC-03.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "1316377383",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "23.24.161.230",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t23.24.161.230\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"Nordc-DC-03.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"23.24.161.230","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-14T01:13:07.863Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-14T01:13:08.811Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t23.24.161.230\n\tSource Port:\t\t53321\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"Nordc-DC-03.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"23.24.161.230","IpPort":"53321","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1316377383,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53321
messagetype: auth_failure
productids: [6]
senderhost: Nordc-DC-03.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 1316377383
streamName: microsoft-windows-security-auditing
clientIP: 23.24.161.230
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"144.129.138.116","externalIp":"144.129.138.116","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=144.129.138.116 ::: serverIP=144.129.138.116 ::: userName=fish ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-19T18:51:59.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"144.129.138.116\",\"externalIp\":\"144.129.138.116\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"entirelysacrament.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=144.129.138.116 ::: serverIP=144.129.138.116 ::: userName=fish ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "entirelysacrament.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "entirelysacrament.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "144.129.138.116",
"serverIP": "247.239.205.246",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"144.129.138.116","externalIp":"144.129.138.116","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=144.129.138.116 ::: serverIP=144.129.138.116 ::: userName=fish ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"144.129.138.116","externalIp":"144.129.138.116","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=144.129.138.116 ::: serverIP=144.129.138.116 ::: userName=fish ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-19T18:51:59.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: entirelysacrament.com
messagetype: firewall_action
severitycode: 2
fqdn: entirelysacrament.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 144.129.138.116
serverIP: 247.239.205.246
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"180.68.249.76","externalIp":"180.68.249.76","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=180.68.249.76 ::: serverIP=180.68.249.76 ::: userName=bob ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-19T18:51:59.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"180.68.249.76\",\"externalIp\":\"180.68.249.76\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"entirelysacrament.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=180.68.249.76 ::: serverIP=180.68.249.76 ::: userName=bob ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "entirelysacrament.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "entirelysacrament.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "180.68.249.76",
"serverIP": "125.62.74.66",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"180.68.249.76","externalIp":"180.68.249.76","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=180.68.249.76 ::: serverIP=180.68.249.76 ::: userName=bob ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"180.68.249.76","externalIp":"180.68.249.76","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=180.68.249.76 ::: serverIP=180.68.249.76 ::: userName=bob ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-19T18:51:59.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: entirelysacrament.com
messagetype: firewall_action
severitycode: 2
fqdn: entirelysacrament.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 180.68.249.76
serverIP: 125.62.74.66
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"193.167.39.212","externalIp":"193.167.39.212","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=193.167.39.212 ::: serverIP=193.167.39.212 ::: userName=bob ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-19T18:51:59.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"193.167.39.212\",\"externalIp\":\"193.167.39.212\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"entirelysacrament.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=193.167.39.212 ::: serverIP=193.167.39.212 ::: userName=bob ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "entirelysacrament.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "entirelysacrament.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "193.167.39.212",
"serverIP": "131.120.55.216",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"193.167.39.212","externalIp":"193.167.39.212","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=193.167.39.212 ::: serverIP=193.167.39.212 ::: userName=bob ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"193.167.39.212","externalIp":"193.167.39.212","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=193.167.39.212 ::: serverIP=193.167.39.212 ::: userName=bob ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-19T18:51:59.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: entirelysacrament.com
messagetype: firewall_action
severitycode: 2
fqdn: entirelysacrament.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 193.167.39.212
serverIP: 131.120.55.216
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"48.35.238.83","externalIp":"48.35.238.83","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=48.35.238.83 ::: serverIP=48.35.238.83 ::: userName=alice ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-19T18:51:59.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"48.35.238.83\",\"externalIp\":\"48.35.238.83\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"entirelysacrament.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=48.35.238.83 ::: serverIP=48.35.238.83 ::: userName=alice ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "entirelysacrament.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "entirelysacrament.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "48.35.238.83",
"serverIP": "63.49.179.133",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"48.35.238.83","externalIp":"48.35.238.83","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=48.35.238.83 ::: serverIP=48.35.238.83 ::: userName=alice ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"48.35.238.83","externalIp":"48.35.238.83","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=48.35.238.83 ::: serverIP=48.35.238.83 ::: userName=alice ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-19T18:51:59.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: entirelysacrament.com
messagetype: firewall_action
severitycode: 2
fqdn: entirelysacrament.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 48.35.238.83
serverIP: 63.49.179.133
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"61.225.19.71","externalIp":"61.225.19.71","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=61.225.19.71 ::: serverIP=61.225.19.71 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-19T18:51:59.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"61.225.19.71\",\"externalIp\":\"61.225.19.71\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"entirelysacrament.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=61.225.19.71 ::: serverIP=61.225.19.71 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "entirelysacrament.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "entirelysacrament.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "61.225.19.71",
"serverIP": "90.106.244.173",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"61.225.19.71","externalIp":"61.225.19.71","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=61.225.19.71 ::: serverIP=61.225.19.71 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"61.225.19.71","externalIp":"61.225.19.71","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=61.225.19.71 ::: serverIP=61.225.19.71 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-19T18:51:59.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: entirelysacrament.com
messagetype: firewall_action
severitycode: 2
fqdn: entirelysacrament.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 61.225.19.71
serverIP: 90.106.244.173
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"140.49.123.75","externalIp":"140.49.123.75","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=140.49.123.75 ::: serverIP=140.49.123.75 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-19T18:51:59.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"140.49.123.75\",\"externalIp\":\"140.49.123.75\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"entirelysacrament.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=140.49.123.75 ::: serverIP=140.49.123.75 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "entirelysacrament.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "entirelysacrament.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "140.49.123.75",
"serverIP": "238.121.234.158",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"140.49.123.75","externalIp":"140.49.123.75","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=140.49.123.75 ::: serverIP=140.49.123.75 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=entirelysacrament.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"140.49.123.75","externalIp":"140.49.123.75","categories":["Malware"],"tags":[],"destination":"entirelysacrament.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=140.49.123.75 ::: serverIP=140.49.123.75 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=entirelysacrament.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-19T18:51:59.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: entirelysacrament.com
messagetype: firewall_action
severitycode: 2
fqdn: entirelysacrament.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 140.49.123.75
serverIP: 238.121.234.158
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"45.163.30.13","externalIp":"45.163.30.13","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=45.163.30.13 ::: serverIP=45.163.30.13 ::: userName=johndoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-19T18:51:59.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"45.163.30.13\",\"externalIp\":\"45.163.30.13\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"limitationvolleyballdejected.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=45.163.30.13 ::: serverIP=45.163.30.13 ::: userName=johndoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "limitationvolleyballdejected.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "limitationvolleyballdejected.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "45.163.30.13",
"serverIP": "172.208.167.236",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"45.163.30.13","externalIp":"45.163.30.13","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=45.163.30.13 ::: serverIP=45.163.30.13 ::: userName=johndoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"45.163.30.13","externalIp":"45.163.30.13","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=45.163.30.13 ::: serverIP=45.163.30.13 ::: userName=johndoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-19T18:51:59.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: limitationvolleyballdejected.com
messagetype: firewall_action
severitycode: 2
fqdn: limitationvolleyballdejected.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 45.163.30.13
serverIP: 172.208.167.236
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"228.11.224.102","externalIp":"228.11.224.102","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=228.11.224.102 ::: serverIP=228.11.224.102 ::: userName=charlie ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-19T18:51:59.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"228.11.224.102\",\"externalIp\":\"228.11.224.102\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"limitationvolleyballdejected.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=228.11.224.102 ::: serverIP=228.11.224.102 ::: userName=charlie ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "limitationvolleyballdejected.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "limitationvolleyballdejected.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "228.11.224.102",
"serverIP": "171.184.216.52",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"228.11.224.102","externalIp":"228.11.224.102","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=228.11.224.102 ::: serverIP=228.11.224.102 ::: userName=charlie ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"228.11.224.102","externalIp":"228.11.224.102","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=228.11.224.102 ::: serverIP=228.11.224.102 ::: userName=charlie ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-19T18:51:59.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: limitationvolleyballdejected.com
messagetype: firewall_action
severitycode: 2
fqdn: limitationvolleyballdejected.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 228.11.224.102
serverIP: 171.184.216.52
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"200.195.26.10","externalIp":"200.195.26.10","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=200.195.26.10 ::: serverIP=200.195.26.10 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-19T18:51:59.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"200.195.26.10\",\"externalIp\":\"200.195.26.10\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"limitationvolleyballdejected.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=200.195.26.10 ::: serverIP=200.195.26.10 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "limitationvolleyballdejected.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "limitationvolleyballdejected.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "200.195.26.10",
"serverIP": "101.145.91.70",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"200.195.26.10","externalIp":"200.195.26.10","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=200.195.26.10 ::: serverIP=200.195.26.10 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"200.195.26.10","externalIp":"200.195.26.10","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=200.195.26.10 ::: serverIP=200.195.26.10 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-19T18:51:59.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: limitationvolleyballdejected.com
messagetype: firewall_action
severitycode: 2
fqdn: limitationvolleyballdejected.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 200.195.26.10
serverIP: 101.145.91.70
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"219.19.46.248","externalIp":"219.19.46.248","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=219.19.46.248 ::: serverIP=219.19.46.248 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-19T18:51:59.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"219.19.46.248\",\"externalIp\":\"219.19.46.248\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"limitationvolleyballdejected.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=219.19.46.248 ::: serverIP=219.19.46.248 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "limitationvolleyballdejected.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "limitationvolleyballdejected.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "219.19.46.248",
"serverIP": "246.29.27.249",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"219.19.46.248","externalIp":"219.19.46.248","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=219.19.46.248 ::: serverIP=219.19.46.248 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"219.19.46.248","externalIp":"219.19.46.248","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=219.19.46.248 ::: serverIP=219.19.46.248 ::: userName=janedoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-19T18:51:59.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: limitationvolleyballdejected.com
messagetype: firewall_action
severitycode: 2
fqdn: limitationvolleyballdejected.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 219.19.46.248
serverIP: 246.29.27.249
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"223.232.46.251","externalIp":"223.232.46.251","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=223.232.46.251 ::: serverIP=223.232.46.251 ::: userName=nighthawk ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-19T18:51:59.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"223.232.46.251\",\"externalIp\":\"223.232.46.251\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"limitationvolleyballdejected.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=223.232.46.251 ::: serverIP=223.232.46.251 ::: userName=nighthawk ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "limitationvolleyballdejected.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "limitationvolleyballdejected.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "223.232.46.251",
"serverIP": "228.180.186.210",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"223.232.46.251","externalIp":"223.232.46.251","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=223.232.46.251 ::: serverIP=223.232.46.251 ::: userName=nighthawk ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"223.232.46.251","externalIp":"223.232.46.251","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=223.232.46.251 ::: serverIP=223.232.46.251 ::: userName=nighthawk ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-19T18:51:59.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: limitationvolleyballdejected.com
messagetype: firewall_action
severitycode: 2
fqdn: limitationvolleyballdejected.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 223.232.46.251
serverIP: 228.180.186.210
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"25.255.195.231","externalIp":"25.255.195.231","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=25.255.195.231 ::: serverIP=25.255.195.231 ::: userName=johndoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-19T18:51:59.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"25.255.195.231\",\"externalIp\":\"25.255.195.231\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"limitationvolleyballdejected.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-19T18:51:59.000Z\"} ::: clientIP=25.255.195.231 ::: serverIP=25.255.195.231 ::: userName=johndoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "limitationvolleyballdejected.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "limitationvolleyballdejected.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "25.255.195.231",
"serverIP": "210.224.184.60",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"25.255.195.231","externalIp":"25.255.195.231","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=25.255.195.231 ::: serverIP=25.255.195.231 ::: userName=johndoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=limitationvolleyballdejected.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"25.255.195.231","externalIp":"25.255.195.231","categories":["Malware"],"tags":[],"destination":"limitationvolleyballdejected.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-19T18:51:59.000Z"} ::: clientIP=25.255.195.231 ::: serverIP=25.255.195.231 ::: userName=johndoe ::: created_at=2022-07-19T18:51:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-19T18:51:59.000Z ::: serverHostname=limitationvolleyballdejected.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-19T18:51:59.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: limitationvolleyballdejected.com
messagetype: firewall_action
severitycode: 2
fqdn: limitationvolleyballdejected.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 25.255.195.231
serverIP: 210.224.184.60
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"charlie","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"70.83.194.143"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for charlie, from Bruteforcer 70.83.194.143 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for charlie: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=70.83.194.143 ::: userName=charlie ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"georegion": "Slovakia, Kosicky kraj, Sobrance",
"message": "WitFoo-Artifact ::: tags=[\"title=CPB - Failed Suspicious Login\",\"description=Failed Suspicious Login Has Been Detected\",\"detail=undefined\"] ::: action=blocked ::: message={\"id\":\"26ee5a873e03e852528a150746be6a02\",\"tenant_id\":\"tenant_a41e6a657eef469dbfe7b26dbeeb4827\",\"timestamp\":1693478756231,\"severity\":\"LOW\",\"title\":\"CPB - Failed Suspicious Login\",\"description\":\"Failed Suspicious Login Has Been Detected\",\"type\":\"Footprint\",\"sub_type\":\"Suspicious Login\",\"related_events\":[{\"event_id\":\"d4bfc03b9e6eb2c74092668fe3680c10\",\"cloud_service\":\"Office 365\",\"timestamp\":1693478375000,\"user_id\":\"user_03c4851626f43836c4ce0664cb25daac\",\"user_email\":\"charlie\",\"full_name\":\"Clara Retana\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36\",\"location\":\"Slovakia, Kosicky kraj, Sobrance\",\"geo_location\":[22.181360244750977,48.74454879760742],\"intelligence\":[{\"ip_address\":\"70.83.194.143\"}],\"event_classification\":{\"id\":\"9852\",\"category\":\"Suspicious Login\",\"sub_category\":\"Suspicious Login\",\"threat\":\"Authentication\"},\"meta_data\":{\"extracted_fields\":[{\"129064\":\"[\\\"50\\\"]\"},{\"129065\":\"[\\\"Failure\\\"]\"},{\"129067\":\"[\\\"Suspicious login attempt detected for charlie, from Bruteforcer 70.83.194.143 (LEKOS s.r.o.) \\\\n\\\\nThreat intelligence: \\\\nProofpoint CASB | IP Last Seen On: 2023-08-31\\\\nProofpoint CASB | Categories: Bruteforcer\\\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\\\nIP Enrichments | Domain: lekosonline.sk\\\\n\\\\nBehavioral indicators for charlie: \\\\nRare country score: High (common country: United States)\\\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\\\nRare isp score: High (common isp: AT&T Internet Services)\\\"]\"},{\"129068\":\"[\\\"Low\\\"]\"}]}}]} ::: program=Office 365 ::: clientIP=70.83.194.143 ::: userName=charlie ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "Office 365",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"description=Failed Suspicious Login Has Been Detected",
"proofpoint_casb",
"title=CPB - Failed Suspicious Login",
"detail=undefined",
"auth_failure"
],
"vendorcode": "9852",
"streamName": "proofpoint_casb",
"clientIP": "70.83.194.143",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"charlie","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"70.83.194.143"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for charlie, from Bruteforcer 70.83.194.143 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for charlie: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=70.83.194.143 ::: userName=charlie ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | Product: CASB
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"charlie","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"70.83.194.143"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for charlie, from Bruteforcer 70.83.194.143 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for charlie: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=70.83.194.143 ::: userName=charlie ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called CASB by ProofPoint. The following fields were extracted from the message:
action: block
georegion: Slovakia, Kosicky kraj, Sobrance
messagetype: auth_failure
productids: [6]
program: Office 365
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['description=Failed Suspicious Login Has Been Detected', 'proofpoint_casb', 'title=CPB - Failed Suspicious Login', 'detail=undefined', 'auth_failure']
vendorcode: 9852
streamName: proofpoint_casb
clientIP: 70.83.194.143
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"janedoe","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"239.94.171.180"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for janedoe, from Bruteforcer 239.94.171.180 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for janedoe: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=239.94.171.180 ::: userName=janedoe ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"georegion": "Slovakia, Kosicky kraj, Sobrance",
"message": "WitFoo-Artifact ::: tags=[\"title=CPB - Failed Suspicious Login\",\"description=Failed Suspicious Login Has Been Detected\",\"detail=undefined\"] ::: action=blocked ::: message={\"id\":\"26ee5a873e03e852528a150746be6a02\",\"tenant_id\":\"tenant_a41e6a657eef469dbfe7b26dbeeb4827\",\"timestamp\":1693478756231,\"severity\":\"LOW\",\"title\":\"CPB - Failed Suspicious Login\",\"description\":\"Failed Suspicious Login Has Been Detected\",\"type\":\"Footprint\",\"sub_type\":\"Suspicious Login\",\"related_events\":[{\"event_id\":\"d4bfc03b9e6eb2c74092668fe3680c10\",\"cloud_service\":\"Office 365\",\"timestamp\":1693478375000,\"user_id\":\"user_03c4851626f43836c4ce0664cb25daac\",\"user_email\":\"janedoe\",\"full_name\":\"Clara Retana\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36\",\"location\":\"Slovakia, Kosicky kraj, Sobrance\",\"geo_location\":[22.181360244750977,48.74454879760742],\"intelligence\":[{\"ip_address\":\"239.94.171.180\"}],\"event_classification\":{\"id\":\"9852\",\"category\":\"Suspicious Login\",\"sub_category\":\"Suspicious Login\",\"threat\":\"Authentication\"},\"meta_data\":{\"extracted_fields\":[{\"129064\":\"[\\\"50\\\"]\"},{\"129065\":\"[\\\"Failure\\\"]\"},{\"129067\":\"[\\\"Suspicious login attempt detected for janedoe, from Bruteforcer 239.94.171.180 (LEKOS s.r.o.) \\\\n\\\\nThreat intelligence: \\\\nProofpoint CASB | IP Last Seen On: 2023-08-31\\\\nProofpoint CASB | Categories: Bruteforcer\\\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\\\nIP Enrichments | Domain: lekosonline.sk\\\\n\\\\nBehavioral indicators for janedoe: \\\\nRare country score: High (common country: United States)\\\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\\\nRare isp score: High (common isp: AT&T Internet Services)\\\"]\"},{\"129068\":\"[\\\"Low\\\"]\"}]}}]} ::: program=Office 365 ::: clientIP=239.94.171.180 ::: userName=janedoe ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "Office 365",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"description=Failed Suspicious Login Has Been Detected",
"proofpoint_casb",
"title=CPB - Failed Suspicious Login",
"detail=undefined",
"auth_failure"
],
"vendorcode": "9852",
"streamName": "proofpoint_casb",
"clientIP": "239.94.171.180",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"janedoe","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"239.94.171.180"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for janedoe, from Bruteforcer 239.94.171.180 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for janedoe: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=239.94.171.180 ::: userName=janedoe ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | Product: CASB
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"janedoe","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"239.94.171.180"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for janedoe, from Bruteforcer 239.94.171.180 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for janedoe: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=239.94.171.180 ::: userName=janedoe ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called CASB by ProofPoint. The following fields were extracted from the message:
action: block
georegion: Slovakia, Kosicky kraj, Sobrance
messagetype: auth_failure
productids: [6]
program: Office 365
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['description=Failed Suspicious Login Has Been Detected', 'proofpoint_casb', 'title=CPB - Failed Suspicious Login', 'detail=undefined', 'auth_failure']
vendorcode: 9852
streamName: proofpoint_casb
clientIP: 239.94.171.180
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"alice","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"242.65.14.149"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for alice, from Bruteforcer 242.65.14.149 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for alice: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=242.65.14.149 ::: userName=alice ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"georegion": "Slovakia, Kosicky kraj, Sobrance",
"message": "WitFoo-Artifact ::: tags=[\"title=CPB - Failed Suspicious Login\",\"description=Failed Suspicious Login Has Been Detected\",\"detail=undefined\"] ::: action=blocked ::: message={\"id\":\"26ee5a873e03e852528a150746be6a02\",\"tenant_id\":\"tenant_a41e6a657eef469dbfe7b26dbeeb4827\",\"timestamp\":1693478756231,\"severity\":\"LOW\",\"title\":\"CPB - Failed Suspicious Login\",\"description\":\"Failed Suspicious Login Has Been Detected\",\"type\":\"Footprint\",\"sub_type\":\"Suspicious Login\",\"related_events\":[{\"event_id\":\"d4bfc03b9e6eb2c74092668fe3680c10\",\"cloud_service\":\"Office 365\",\"timestamp\":1693478375000,\"user_id\":\"user_03c4851626f43836c4ce0664cb25daac\",\"user_email\":\"alice\",\"full_name\":\"Clara Retana\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36\",\"location\":\"Slovakia, Kosicky kraj, Sobrance\",\"geo_location\":[22.181360244750977,48.74454879760742],\"intelligence\":[{\"ip_address\":\"242.65.14.149\"}],\"event_classification\":{\"id\":\"9852\",\"category\":\"Suspicious Login\",\"sub_category\":\"Suspicious Login\",\"threat\":\"Authentication\"},\"meta_data\":{\"extracted_fields\":[{\"129064\":\"[\\\"50\\\"]\"},{\"129065\":\"[\\\"Failure\\\"]\"},{\"129067\":\"[\\\"Suspicious login attempt detected for alice, from Bruteforcer 242.65.14.149 (LEKOS s.r.o.) \\\\n\\\\nThreat intelligence: \\\\nProofpoint CASB | IP Last Seen On: 2023-08-31\\\\nProofpoint CASB | Categories: Bruteforcer\\\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\\\nIP Enrichments | Domain: lekosonline.sk\\\\n\\\\nBehavioral indicators for alice: \\\\nRare country score: High (common country: United States)\\\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\\\nRare isp score: High (common isp: AT&T Internet Services)\\\"]\"},{\"129068\":\"[\\\"Low\\\"]\"}]}}]} ::: program=Office 365 ::: clientIP=242.65.14.149 ::: userName=alice ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "Office 365",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"description=Failed Suspicious Login Has Been Detected",
"proofpoint_casb",
"title=CPB - Failed Suspicious Login",
"detail=undefined",
"auth_failure"
],
"vendorcode": "9852",
"streamName": "proofpoint_casb",
"clientIP": "242.65.14.149",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"alice","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"242.65.14.149"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for alice, from Bruteforcer 242.65.14.149 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for alice: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=242.65.14.149 ::: userName=alice ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | Product: CASB
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"alice","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"242.65.14.149"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for alice, from Bruteforcer 242.65.14.149 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for alice: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=242.65.14.149 ::: userName=alice ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called CASB by ProofPoint. The following fields were extracted from the message:
action: block
georegion: Slovakia, Kosicky kraj, Sobrance
messagetype: auth_failure
productids: [6]
program: Office 365
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['description=Failed Suspicious Login Has Been Detected', 'proofpoint_casb', 'title=CPB - Failed Suspicious Login', 'detail=undefined', 'auth_failure']
vendorcode: 9852
streamName: proofpoint_casb
clientIP: 242.65.14.149
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"janedoe","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"101.182.246.65"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for janedoe, from Bruteforcer 101.182.246.65 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for janedoe: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=101.182.246.65 ::: userName=janedoe ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"georegion": "Slovakia, Kosicky kraj, Sobrance",
"message": "WitFoo-Artifact ::: tags=[\"title=CPB - Failed Suspicious Login\",\"description=Failed Suspicious Login Has Been Detected\",\"detail=undefined\"] ::: action=blocked ::: message={\"id\":\"26ee5a873e03e852528a150746be6a02\",\"tenant_id\":\"tenant_a41e6a657eef469dbfe7b26dbeeb4827\",\"timestamp\":1693478756231,\"severity\":\"LOW\",\"title\":\"CPB - Failed Suspicious Login\",\"description\":\"Failed Suspicious Login Has Been Detected\",\"type\":\"Footprint\",\"sub_type\":\"Suspicious Login\",\"related_events\":[{\"event_id\":\"d4bfc03b9e6eb2c74092668fe3680c10\",\"cloud_service\":\"Office 365\",\"timestamp\":1693478375000,\"user_id\":\"user_03c4851626f43836c4ce0664cb25daac\",\"user_email\":\"janedoe\",\"full_name\":\"Clara Retana\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36\",\"location\":\"Slovakia, Kosicky kraj, Sobrance\",\"geo_location\":[22.181360244750977,48.74454879760742],\"intelligence\":[{\"ip_address\":\"101.182.246.65\"}],\"event_classification\":{\"id\":\"9852\",\"category\":\"Suspicious Login\",\"sub_category\":\"Suspicious Login\",\"threat\":\"Authentication\"},\"meta_data\":{\"extracted_fields\":[{\"129064\":\"[\\\"50\\\"]\"},{\"129065\":\"[\\\"Failure\\\"]\"},{\"129067\":\"[\\\"Suspicious login attempt detected for janedoe, from Bruteforcer 101.182.246.65 (LEKOS s.r.o.) \\\\n\\\\nThreat intelligence: \\\\nProofpoint CASB | IP Last Seen On: 2023-08-31\\\\nProofpoint CASB | Categories: Bruteforcer\\\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\\\nIP Enrichments | Domain: lekosonline.sk\\\\n\\\\nBehavioral indicators for janedoe: \\\\nRare country score: High (common country: United States)\\\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\\\nRare isp score: High (common isp: AT&T Internet Services)\\\"]\"},{\"129068\":\"[\\\"Low\\\"]\"}]}}]} ::: program=Office 365 ::: clientIP=101.182.246.65 ::: userName=janedoe ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "Office 365",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"description=Failed Suspicious Login Has Been Detected",
"proofpoint_casb",
"title=CPB - Failed Suspicious Login",
"detail=undefined",
"auth_failure"
],
"vendorcode": "9852",
"streamName": "proofpoint_casb",
"clientIP": "101.182.246.65",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"janedoe","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"101.182.246.65"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for janedoe, from Bruteforcer 101.182.246.65 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for janedoe: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=101.182.246.65 ::: userName=janedoe ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | Product: CASB
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"janedoe","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"101.182.246.65"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for janedoe, from Bruteforcer 101.182.246.65 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for janedoe: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=101.182.246.65 ::: userName=janedoe ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called CASB by ProofPoint. The following fields were extracted from the message:
action: block
georegion: Slovakia, Kosicky kraj, Sobrance
messagetype: auth_failure
productids: [6]
program: Office 365
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['description=Failed Suspicious Login Has Been Detected', 'proofpoint_casb', 'title=CPB - Failed Suspicious Login', 'detail=undefined', 'auth_failure']
vendorcode: 9852
streamName: proofpoint_casb
clientIP: 101.182.246.65
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"nighthawk","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"14.250.106.133"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for nighthawk, from Bruteforcer 14.250.106.133 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for nighthawk: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=14.250.106.133 ::: userName=nighthawk ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"georegion": "Slovakia, Kosicky kraj, Sobrance",
"message": "WitFoo-Artifact ::: tags=[\"title=CPB - Failed Suspicious Login\",\"description=Failed Suspicious Login Has Been Detected\",\"detail=undefined\"] ::: action=blocked ::: message={\"id\":\"26ee5a873e03e852528a150746be6a02\",\"tenant_id\":\"tenant_a41e6a657eef469dbfe7b26dbeeb4827\",\"timestamp\":1693478756231,\"severity\":\"LOW\",\"title\":\"CPB - Failed Suspicious Login\",\"description\":\"Failed Suspicious Login Has Been Detected\",\"type\":\"Footprint\",\"sub_type\":\"Suspicious Login\",\"related_events\":[{\"event_id\":\"d4bfc03b9e6eb2c74092668fe3680c10\",\"cloud_service\":\"Office 365\",\"timestamp\":1693478375000,\"user_id\":\"user_03c4851626f43836c4ce0664cb25daac\",\"user_email\":\"nighthawk\",\"full_name\":\"Clara Retana\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36\",\"location\":\"Slovakia, Kosicky kraj, Sobrance\",\"geo_location\":[22.181360244750977,48.74454879760742],\"intelligence\":[{\"ip_address\":\"14.250.106.133\"}],\"event_classification\":{\"id\":\"9852\",\"category\":\"Suspicious Login\",\"sub_category\":\"Suspicious Login\",\"threat\":\"Authentication\"},\"meta_data\":{\"extracted_fields\":[{\"129064\":\"[\\\"50\\\"]\"},{\"129065\":\"[\\\"Failure\\\"]\"},{\"129067\":\"[\\\"Suspicious login attempt detected for nighthawk, from Bruteforcer 14.250.106.133 (LEKOS s.r.o.) \\\\n\\\\nThreat intelligence: \\\\nProofpoint CASB | IP Last Seen On: 2023-08-31\\\\nProofpoint CASB | Categories: Bruteforcer\\\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\\\nIP Enrichments | Domain: lekosonline.sk\\\\n\\\\nBehavioral indicators for nighthawk: \\\\nRare country score: High (common country: United States)\\\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\\\nRare isp score: High (common isp: AT&T Internet Services)\\\"]\"},{\"129068\":\"[\\\"Low\\\"]\"}]}}]} ::: program=Office 365 ::: clientIP=14.250.106.133 ::: userName=nighthawk ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "Office 365",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"description=Failed Suspicious Login Has Been Detected",
"proofpoint_casb",
"title=CPB - Failed Suspicious Login",
"detail=undefined",
"auth_failure"
],
"vendorcode": "9852",
"streamName": "proofpoint_casb",
"clientIP": "14.250.106.133",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"nighthawk","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"14.250.106.133"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for nighthawk, from Bruteforcer 14.250.106.133 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for nighthawk: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=14.250.106.133 ::: userName=nighthawk ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | Product: CASB
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"nighthawk","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"14.250.106.133"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for nighthawk, from Bruteforcer 14.250.106.133 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for nighthawk: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=14.250.106.133 ::: userName=nighthawk ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called CASB by ProofPoint. The following fields were extracted from the message:
action: block
georegion: Slovakia, Kosicky kraj, Sobrance
messagetype: auth_failure
productids: [6]
program: Office 365
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['description=Failed Suspicious Login Has Been Detected', 'proofpoint_casb', 'title=CPB - Failed Suspicious Login', 'detail=undefined', 'auth_failure']
vendorcode: 9852
streamName: proofpoint_casb
clientIP: 14.250.106.133
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"fish","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"140.65.129.209"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for fish, from Bruteforcer 140.65.129.209 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for fish: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=140.65.129.209 ::: userName=fish ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"georegion": "Slovakia, Kosicky kraj, Sobrance",
"message": "WitFoo-Artifact ::: tags=[\"title=CPB - Failed Suspicious Login\",\"description=Failed Suspicious Login Has Been Detected\",\"detail=undefined\"] ::: action=blocked ::: message={\"id\":\"26ee5a873e03e852528a150746be6a02\",\"tenant_id\":\"tenant_a41e6a657eef469dbfe7b26dbeeb4827\",\"timestamp\":1693478756231,\"severity\":\"LOW\",\"title\":\"CPB - Failed Suspicious Login\",\"description\":\"Failed Suspicious Login Has Been Detected\",\"type\":\"Footprint\",\"sub_type\":\"Suspicious Login\",\"related_events\":[{\"event_id\":\"d4bfc03b9e6eb2c74092668fe3680c10\",\"cloud_service\":\"Office 365\",\"timestamp\":1693478375000,\"user_id\":\"user_03c4851626f43836c4ce0664cb25daac\",\"user_email\":\"fish\",\"full_name\":\"Clara Retana\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36\",\"location\":\"Slovakia, Kosicky kraj, Sobrance\",\"geo_location\":[22.181360244750977,48.74454879760742],\"intelligence\":[{\"ip_address\":\"140.65.129.209\"}],\"event_classification\":{\"id\":\"9852\",\"category\":\"Suspicious Login\",\"sub_category\":\"Suspicious Login\",\"threat\":\"Authentication\"},\"meta_data\":{\"extracted_fields\":[{\"129064\":\"[\\\"50\\\"]\"},{\"129065\":\"[\\\"Failure\\\"]\"},{\"129067\":\"[\\\"Suspicious login attempt detected for fish, from Bruteforcer 140.65.129.209 (LEKOS s.r.o.) \\\\n\\\\nThreat intelligence: \\\\nProofpoint CASB | IP Last Seen On: 2023-08-31\\\\nProofpoint CASB | Categories: Bruteforcer\\\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\\\nIP Enrichments | Domain: lekosonline.sk\\\\n\\\\nBehavioral indicators for fish: \\\\nRare country score: High (common country: United States)\\\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\\\nRare isp score: High (common isp: AT&T Internet Services)\\\"]\"},{\"129068\":\"[\\\"Low\\\"]\"}]}}]} ::: program=Office 365 ::: clientIP=140.65.129.209 ::: userName=fish ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "Office 365",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"description=Failed Suspicious Login Has Been Detected",
"proofpoint_casb",
"title=CPB - Failed Suspicious Login",
"detail=undefined",
"auth_failure"
],
"vendorcode": "9852",
"streamName": "proofpoint_casb",
"clientIP": "140.65.129.209",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"fish","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"140.65.129.209"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for fish, from Bruteforcer 140.65.129.209 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for fish: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=140.65.129.209 ::: userName=fish ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | Product: CASB
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"26ee5a873e03e852528a150746be6a02","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1693478756231,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"d4bfc03b9e6eb2c74092668fe3680c10","cloud_service":"Office 365","timestamp":1693478375000,"user_id":"user_03c4851626f43836c4ce0664cb25daac","user_email":"fish","full_name":"Clara Retana","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Slovakia, Kosicky kraj, Sobrance","geo_location":[22.181360244750977,48.74454879760742],"intelligence":[{"ip_address":"140.65.129.209"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for fish, from Bruteforcer 140.65.129.209 (LEKOS s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-08-31\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: lekosonline.sk\\n\\nBehavioral indicators for fish: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: windows/10/x64/microsoft edge/115.0////)\\nRare isp score: High (common isp: AT&T Internet Services)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=140.65.129.209 ::: userName=fish ::: geoRegion=Slovakia, Kosicky kraj, Sobrance ::: created_at=1693478756231 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called CASB by ProofPoint. The following fields were extracted from the message:
action: block
georegion: Slovakia, Kosicky kraj, Sobrance
messagetype: auth_failure
productids: [6]
program: Office 365
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['description=Failed Suspicious Login Has Been Detected', 'proofpoint_casb', 'title=CPB - Failed Suspicious Login', 'detail=undefined', 'auth_failure']
vendorcode: 9852
streamName: proofpoint_casb
clientIP: 140.65.129.209
userName: fish | Explain this syslog message |
<134>Oct 14 15:20:07 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1471|1000437|Microsoft IIS WebDAV Long Request Buffer Overflow|8|cn1=36134 cn1Label=Host ID dvc=28.251.22.51 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:A9:C5:C8:B8:43 TrendMicroDsFrameType=IP src=224.210.243.150 dst=28.251.22.51 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=21114 dpt=443 cs2=ACK cs2Label=TCP Flags cnt=1 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.4",
"serverport": 443,
"severitylabel": "critical",
"tags": [
"TCP Flags:ACK",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"trend micro_deep security agent",
"DPI Stream Position:0",
"Microsoft IIS WebDAV Long Request Buffer Overflow",
"trend micro_deep security agent_Microsoft IIS WebDAV Long Request Buffer Overflow"
],
"productids": [
30
],
"severitycode": 2,
"sourceinfo": "unknown",
"message": "<134>Oct 14 15:20:07 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1471|1000437|Microsoft IIS WebDAV Long Request Buffer Overflow|8|cn1=36134 cn1Label=Host ID dvc=28.251.22.51 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:A9:C5:C8:B8:43 TrendMicroDsFrameType=IP src=224.210.243.150 dst=28.251.22.51 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=21114 dpt=443 cs2=ACK cs2Label=TCP Flags cnt=1 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags",
"localstarttime": "Oct 14 15:20:07",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Microsoft IIS WebDAV Long Request Buffer Overflow",
"servermac": "0EF282A10881",
"clientmac": "0EA9C5C8B843",
"clientport": 21114,
"vendorcode": "1000437",
"action": "Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "224.210.243.150",
"serverIP": "28.251.22.51"
} | Create a JSON artifact from the message |
<134>Oct 14 15:20:07 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1471|1000437|Microsoft IIS WebDAV Long Request Buffer Overflow|8|cn1=36134 cn1Label=Host ID dvc=28.251.22.51 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:A9:C5:C8:B8:43 TrendMicroDsFrameType=IP src=224.210.243.150 dst=28.251.22.51 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=21114 dpt=443 cs2=ACK cs2Label=TCP Flags cnt=1 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 14 15:20:07 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1471|1000437|Microsoft IIS WebDAV Long Request Buffer Overflow|8|cn1=36134 cn1Label=Host ID dvc=28.251.22.51 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:A9:C5:C8:B8:43 TrendMicroDsFrameType=IP src=224.210.243.150 dst=28.251.22.51 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=21114 dpt=443 cs2=ACK cs2Label=TCP Flags cnt=1 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.4
serverport: 443
severitylabel: critical
tags: ['TCP Flags:ACK', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position:0', 'Microsoft IIS WebDAV Long Request Buffer Overflow', 'trend micro_deep security agent_Microsoft IIS WebDAV Long Request Buffer Overflow']
productids: [30]
severitycode: 2
sourceinfo: unknown
localstarttime: Oct 14 15:20:07
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Microsoft IIS WebDAV Long Request Buffer Overflow
servermac: 0EF282A10881
clientmac: 0EA9C5C8B843
clientport: 21114
vendorcode: 1000437
action: Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 224.210.243.150
serverIP: 28.251.22.51 | Explain this syslog message |
<134>Oct 14 15:20:07 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1471|1000437|Microsoft IIS WebDAV Long Request Buffer Overflow|8|cn1=36134 cn1Label=Host ID dvc=134.164.252.34 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:A9:C5:C8:B8:43 TrendMicroDsFrameType=IP src=210.120.141.16 dst=134.164.252.34 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=21114 dpt=443 cs2=ACK cs2Label=TCP Flags cnt=1 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.4",
"serverport": 443,
"severitylabel": "critical",
"tags": [
"TCP Flags:ACK",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"trend micro_deep security agent",
"DPI Stream Position:0",
"Microsoft IIS WebDAV Long Request Buffer Overflow",
"trend micro_deep security agent_Microsoft IIS WebDAV Long Request Buffer Overflow"
],
"productids": [
30
],
"severitycode": 2,
"sourceinfo": "unknown",
"message": "<134>Oct 14 15:20:07 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1471|1000437|Microsoft IIS WebDAV Long Request Buffer Overflow|8|cn1=36134 cn1Label=Host ID dvc=134.164.252.34 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:A9:C5:C8:B8:43 TrendMicroDsFrameType=IP src=210.120.141.16 dst=134.164.252.34 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=21114 dpt=443 cs2=ACK cs2Label=TCP Flags cnt=1 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags",
"localstarttime": "Oct 14 15:20:07",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Microsoft IIS WebDAV Long Request Buffer Overflow",
"servermac": "0EF282A10881",
"clientmac": "0EA9C5C8B843",
"clientport": 21114,
"vendorcode": "1000437",
"action": "Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "210.120.141.16",
"serverIP": "134.164.252.34"
} | Create a JSON artifact from the message |
<134>Oct 14 15:20:07 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1471|1000437|Microsoft IIS WebDAV Long Request Buffer Overflow|8|cn1=36134 cn1Label=Host ID dvc=134.164.252.34 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:A9:C5:C8:B8:43 TrendMicroDsFrameType=IP src=210.120.141.16 dst=134.164.252.34 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=21114 dpt=443 cs2=ACK cs2Label=TCP Flags cnt=1 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 14 15:20:07 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1471|1000437|Microsoft IIS WebDAV Long Request Buffer Overflow|8|cn1=36134 cn1Label=Host ID dvc=134.164.252.34 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:A9:C5:C8:B8:43 TrendMicroDsFrameType=IP src=210.120.141.16 dst=134.164.252.34 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=21114 dpt=443 cs2=ACK cs2Label=TCP Flags cnt=1 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.4
serverport: 443
severitylabel: critical
tags: ['TCP Flags:ACK', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position:0', 'Microsoft IIS WebDAV Long Request Buffer Overflow', 'trend micro_deep security agent_Microsoft IIS WebDAV Long Request Buffer Overflow']
productids: [30]
severitycode: 2
sourceinfo: unknown
localstarttime: Oct 14 15:20:07
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Microsoft IIS WebDAV Long Request Buffer Overflow
servermac: 0EF282A10881
clientmac: 0EA9C5C8B843
clientport: 21114
vendorcode: 1000437
action: Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 210.120.141.16
serverIP: 134.164.252.34 | Explain this syslog message |
WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"128.205.167.144","externalIp":"77.32.227.67","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel6.carcgl.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=128.205.167.144 ::: serverIP=77.32.227.67 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "kingdel6.carcgl.com",
"message": "WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"128.205.167.144\",\"externalIp\":\"77.32.227.67\",\"categories\":[\"DNS Tunneling VPN\"],\"tags\":[],\"destination\":\"kingdel6.carcgl.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-15T11:48:14.000Z\"} ::: clientIP=128.205.167.144 ::: serverIP=77.32.227.67 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "kingdel6.carcgl.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-15T11:48:14.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "DNS Tunneling VPN",
"streamName": "OpenDNS Detection",
"clientIP": "128.205.167.144",
"serverIP": "77.32.227.67",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"128.205.167.144","externalIp":"77.32.227.67","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel6.carcgl.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=128.205.167.144 ::: serverIP=77.32.227.67 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"128.205.167.144","externalIp":"77.32.227.67","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel6.carcgl.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=128.205.167.144 ::: serverIP=77.32.227.67 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: kingdel6.carcgl.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: kingdel6.carcgl.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-15T11:48:14.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: DNS Tunneling VPN
streamName: OpenDNS Detection
clientIP: 128.205.167.144
serverIP: 77.32.227.67
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"196.100.136.2","externalIp":"186.116.169.76","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel6.carcgl.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=196.100.136.2 ::: serverIP=186.116.169.76 ::: userName=johndoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "kingdel6.carcgl.com",
"message": "WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"196.100.136.2\",\"externalIp\":\"186.116.169.76\",\"categories\":[\"DNS Tunneling VPN\"],\"tags\":[],\"destination\":\"kingdel6.carcgl.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-15T11:48:14.000Z\"} ::: clientIP=196.100.136.2 ::: serverIP=186.116.169.76 ::: userName=johndoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "kingdel6.carcgl.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-15T11:48:14.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "DNS Tunneling VPN",
"streamName": "OpenDNS Detection",
"clientIP": "196.100.136.2",
"serverIP": "186.116.169.76",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"196.100.136.2","externalIp":"186.116.169.76","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel6.carcgl.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=196.100.136.2 ::: serverIP=186.116.169.76 ::: userName=johndoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"196.100.136.2","externalIp":"186.116.169.76","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel6.carcgl.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=196.100.136.2 ::: serverIP=186.116.169.76 ::: userName=johndoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: kingdel6.carcgl.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: kingdel6.carcgl.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-15T11:48:14.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: DNS Tunneling VPN
streamName: OpenDNS Detection
clientIP: 196.100.136.2
serverIP: 186.116.169.76
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=kingdel.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"105.136.165.95","externalIp":"67.23.95.143","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel.carcgl.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=105.136.165.95 ::: serverIP=67.23.95.143 ::: userName=charlie ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel.carcgl.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "kingdel.carcgl.com",
"message": "WitFoo-Artifact ::: fqdn=kingdel.carcgl.com ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"105.136.165.95\",\"externalIp\":\"67.23.95.143\",\"categories\":[\"DNS Tunneling VPN\"],\"tags\":[],\"destination\":\"kingdel.carcgl.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-15T11:48:14.000Z\"} ::: clientIP=105.136.165.95 ::: serverIP=67.23.95.143 ::: userName=charlie ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel.carcgl.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "kingdel.carcgl.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-15T11:48:14.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "DNS Tunneling VPN",
"streamName": "OpenDNS Detection",
"clientIP": "105.136.165.95",
"serverIP": "67.23.95.143",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=kingdel.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"105.136.165.95","externalIp":"67.23.95.143","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel.carcgl.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=105.136.165.95 ::: serverIP=67.23.95.143 ::: userName=charlie ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel.carcgl.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=kingdel.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"105.136.165.95","externalIp":"67.23.95.143","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel.carcgl.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=105.136.165.95 ::: serverIP=67.23.95.143 ::: userName=charlie ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel.carcgl.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: kingdel.carcgl.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: kingdel.carcgl.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-15T11:48:14.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: DNS Tunneling VPN
streamName: OpenDNS Detection
clientIP: 105.136.165.95
serverIP: 67.23.95.143
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=kingdel.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"120.201.62.23","externalIp":"126.251.39.205","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel.carcgl.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=120.201.62.23 ::: serverIP=126.251.39.205 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel.carcgl.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "kingdel.carcgl.com",
"message": "WitFoo-Artifact ::: fqdn=kingdel.carcgl.com ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"120.201.62.23\",\"externalIp\":\"126.251.39.205\",\"categories\":[\"DNS Tunneling VPN\"],\"tags\":[],\"destination\":\"kingdel.carcgl.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-15T11:48:14.000Z\"} ::: clientIP=120.201.62.23 ::: serverIP=126.251.39.205 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel.carcgl.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "kingdel.carcgl.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-15T11:48:14.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "DNS Tunneling VPN",
"streamName": "OpenDNS Detection",
"clientIP": "120.201.62.23",
"serverIP": "126.251.39.205",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=kingdel.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"120.201.62.23","externalIp":"126.251.39.205","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel.carcgl.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=120.201.62.23 ::: serverIP=126.251.39.205 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel.carcgl.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=kingdel.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"120.201.62.23","externalIp":"126.251.39.205","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel.carcgl.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=120.201.62.23 ::: serverIP=126.251.39.205 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel.carcgl.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: kingdel.carcgl.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: kingdel.carcgl.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-15T11:48:14.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: DNS Tunneling VPN
streamName: OpenDNS Detection
clientIP: 120.201.62.23
serverIP: 126.251.39.205
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"78.131.177.50","externalIp":"226.109.224.255","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel6.carcgl.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=78.131.177.50 ::: serverIP=226.109.224.255 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "kingdel6.carcgl.com",
"message": "WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={\"originId\":535242838,\"originType\":\"Network Devices\",\"internalIp\":\"78.131.177.50\",\"externalIp\":\"226.109.224.255\",\"categories\":[\"DNS Tunneling VPN\"],\"tags\":[],\"destination\":\"kingdel6.carcgl.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-15T11:48:14.000Z\"} ::: clientIP=78.131.177.50 ::: serverIP=226.109.224.255 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "kingdel6.carcgl.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-15T11:48:14.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "DNS Tunneling VPN",
"streamName": "OpenDNS Detection",
"clientIP": "78.131.177.50",
"serverIP": "226.109.224.255",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=kingdel6.carcgl.com ::: action=BLOCKED ::: message={"originId":535242838,"originType":"Network Devices","internalIp":"78.131.177.50","externalIp":"226.109.224.255","categories":["DNS Tunneling VPN"],"tags":[],"destination":"kingdel6.carcgl.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-15T11:48:14.000Z"} ::: clientIP=78.131.177.50 ::: serverIP=226.109.224.255 ::: userName=janedoe ::: created_at=2023-05-15T11:48:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=DNS Tunneling VPN ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T11:48:14.000Z ::: serverHostname=kingdel6.carcgl.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.