input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":410612262,"originType":"AD Users","internalIp":"192.244.210.196","externalIp":"135.46.185.137","categories":["Malware","Phishing"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-19T19:21:01.000Z"} ::: clientIP=192.244.210.196 ::: serverIP=135.46.185.137 ::: userName=alice ::: created_at=2023-05-19T19:21:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-19T19:21:01.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":410612262,\"originType\":\"AD Users\",\"internalIp\":\"192.244.210.196\",\"externalIp\":\"135.46.185.137\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-19T19:21:01.000Z\"} ::: clientIP=192.244.210.196 ::: serverIP=135.46.185.137 ::: userName=alice ::: created_at=2023-05-19T19:21:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-19T19:21:01.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-19T19:21:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "192.244.210.196",
"serverIP": "135.46.185.137",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":410612262,"originType":"AD Users","internalIp":"192.244.210.196","externalIp":"135.46.185.137","categories":["Malware","Phishing"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-19T19:21:01.000Z"} ::: clientIP=192.244.210.196 ::: serverIP=135.46.185.137 ::: userName=alice ::: created_at=2023-05-19T19:21:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-19T19:21:01.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":410612262,"originType":"AD Users","internalIp":"192.244.210.196","externalIp":"135.46.185.137","categories":["Malware","Phishing"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-19T19:21:01.000Z"} ::: clientIP=192.244.210.196 ::: serverIP=135.46.185.137 ::: userName=alice ::: created_at=2023-05-19T19:21:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-19T19:21:01.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-19T19:21:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 192.244.210.196
serverIP: 135.46.185.137
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":410612262,"originType":"AD Users","internalIp":"41.172.214.221","externalIp":"102.235.45.228","categories":["Malware","Phishing"],"tags":[],"destination":"xobr219pa.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-19T19:21:01.000Z"} ::: clientIP=41.172.214.221 ::: serverIP=102.235.45.228 ::: userName=nighthawk ::: created_at=2023-05-19T19:21:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-19T19:21:01.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":410612262,\"originType\":\"AD Users\",\"internalIp\":\"41.172.214.221\",\"externalIp\":\"102.235.45.228\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-19T19:21:01.000Z\"} ::: clientIP=41.172.214.221 ::: serverIP=102.235.45.228 ::: userName=nighthawk ::: created_at=2023-05-19T19:21:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-19T19:21:01.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-19T19:21:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "41.172.214.221",
"serverIP": "102.235.45.228",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":410612262,"originType":"AD Users","internalIp":"41.172.214.221","externalIp":"102.235.45.228","categories":["Malware","Phishing"],"tags":[],"destination":"xobr219pa.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-19T19:21:01.000Z"} ::: clientIP=41.172.214.221 ::: serverIP=102.235.45.228 ::: userName=nighthawk ::: created_at=2023-05-19T19:21:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-19T19:21:01.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":410612262,"originType":"AD Users","internalIp":"41.172.214.221","externalIp":"102.235.45.228","categories":["Malware","Phishing"],"tags":[],"destination":"xobr219pa.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-19T19:21:01.000Z"} ::: clientIP=41.172.214.221 ::: serverIP=102.235.45.228 ::: userName=nighthawk ::: created_at=2023-05-19T19:21:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-19T19:21:01.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-19T19:21:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 41.172.214.221
serverIP: 102.235.45.228
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":410612262,"originType":"AD Users","internalIp":"129.99.233.155","externalIp":"49.87.61.137","categories":["Malware","Phishing"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-19T19:21:01.000Z"} ::: clientIP=129.99.233.155 ::: serverIP=49.87.61.137 ::: userName=alice ::: created_at=2023-05-19T19:21:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-19T19:21:01.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":410612262,\"originType\":\"AD Users\",\"internalIp\":\"129.99.233.155\",\"externalIp\":\"49.87.61.137\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-19T19:21:01.000Z\"} ::: clientIP=129.99.233.155 ::: serverIP=49.87.61.137 ::: userName=alice ::: created_at=2023-05-19T19:21:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-19T19:21:01.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-19T19:21:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "129.99.233.155",
"serverIP": "49.87.61.137",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":410612262,"originType":"AD Users","internalIp":"129.99.233.155","externalIp":"49.87.61.137","categories":["Malware","Phishing"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-19T19:21:01.000Z"} ::: clientIP=129.99.233.155 ::: serverIP=49.87.61.137 ::: userName=alice ::: created_at=2023-05-19T19:21:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-19T19:21:01.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":410612262,"originType":"AD Users","internalIp":"129.99.233.155","externalIp":"49.87.61.137","categories":["Malware","Phishing"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-19T19:21:01.000Z"} ::: clientIP=129.99.233.155 ::: serverIP=49.87.61.137 ::: userName=alice ::: created_at=2023-05-19T19:21:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-19T19:21:01.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-19T19:21:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 129.99.233.155
serverIP: 49.87.61.137
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":410612262,"originType":"AD Users","internalIp":"208.110.17.198","externalIp":"16.56.231.92","categories":["Malware","Phishing"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-19T19:21:01.000Z"} ::: clientIP=208.110.17.198 ::: serverIP=16.56.231.92 ::: userName=janedoe ::: created_at=2023-05-19T19:21:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-19T19:21:01.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":410612262,\"originType\":\"AD Users\",\"internalIp\":\"208.110.17.198\",\"externalIp\":\"16.56.231.92\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-19T19:21:01.000Z\"} ::: clientIP=208.110.17.198 ::: serverIP=16.56.231.92 ::: userName=janedoe ::: created_at=2023-05-19T19:21:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-19T19:21:01.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-19T19:21:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "208.110.17.198",
"serverIP": "16.56.231.92",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":410612262,"originType":"AD Users","internalIp":"208.110.17.198","externalIp":"16.56.231.92","categories":["Malware","Phishing"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-19T19:21:01.000Z"} ::: clientIP=208.110.17.198 ::: serverIP=16.56.231.92 ::: userName=janedoe ::: created_at=2023-05-19T19:21:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-19T19:21:01.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":410612262,"originType":"AD Users","internalIp":"208.110.17.198","externalIp":"16.56.231.92","categories":["Malware","Phishing"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-19T19:21:01.000Z"} ::: clientIP=208.110.17.198 ::: serverIP=16.56.231.92 ::: userName=janedoe ::: created_at=2023-05-19T19:21:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-19T19:21:01.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-19T19:21:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 208.110.17.198
serverIP: 16.56.231.92
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":606659004,"originType":"Network Devices","internalIp":"218.223.74.169","externalIp":"178.136.130.197","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-24T13:52:35.000Z"} ::: clientIP=218.223.74.169 ::: serverIP=178.136.130.197 ::: userName=alice ::: created_at=2023-05-24T13:52:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T13:52:35.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":606659004,\"originType\":\"Network Devices\",\"internalIp\":\"218.223.74.169\",\"externalIp\":\"178.136.130.197\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-24T13:52:35.000Z\"} ::: clientIP=218.223.74.169 ::: serverIP=178.136.130.197 ::: userName=alice ::: created_at=2023-05-24T13:52:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T13:52:35.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-24T13:52:35.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "218.223.74.169",
"serverIP": "178.136.130.197",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":606659004,"originType":"Network Devices","internalIp":"218.223.74.169","externalIp":"178.136.130.197","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-24T13:52:35.000Z"} ::: clientIP=218.223.74.169 ::: serverIP=178.136.130.197 ::: userName=alice ::: created_at=2023-05-24T13:52:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T13:52:35.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":606659004,"originType":"Network Devices","internalIp":"218.223.74.169","externalIp":"178.136.130.197","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-24T13:52:35.000Z"} ::: clientIP=218.223.74.169 ::: serverIP=178.136.130.197 ::: userName=alice ::: created_at=2023-05-24T13:52:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T13:52:35.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-24T13:52:35.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 218.223.74.169
serverIP: 178.136.130.197
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":606659004,"originType":"Network Devices","internalIp":"49.215.87.195","externalIp":"231.116.132.98","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-24T13:52:35.000Z"} ::: clientIP=49.215.87.195 ::: serverIP=231.116.132.98 ::: userName=janedoe ::: created_at=2023-05-24T13:52:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T13:52:35.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":606659004,\"originType\":\"Network Devices\",\"internalIp\":\"49.215.87.195\",\"externalIp\":\"231.116.132.98\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-24T13:52:35.000Z\"} ::: clientIP=49.215.87.195 ::: serverIP=231.116.132.98 ::: userName=janedoe ::: created_at=2023-05-24T13:52:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T13:52:35.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-24T13:52:35.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "49.215.87.195",
"serverIP": "231.116.132.98",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":606659004,"originType":"Network Devices","internalIp":"49.215.87.195","externalIp":"231.116.132.98","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-24T13:52:35.000Z"} ::: clientIP=49.215.87.195 ::: serverIP=231.116.132.98 ::: userName=janedoe ::: created_at=2023-05-24T13:52:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T13:52:35.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":606659004,"originType":"Network Devices","internalIp":"49.215.87.195","externalIp":"231.116.132.98","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-24T13:52:35.000Z"} ::: clientIP=49.215.87.195 ::: serverIP=231.116.132.98 ::: userName=janedoe ::: created_at=2023-05-24T13:52:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T13:52:35.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-24T13:52:35.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 49.215.87.195
serverIP: 231.116.132.98
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":606939898,"originType":"Network Devices","internalIp":"88.139.93.220","externalIp":"2.91.140.191","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T16:14:30.000Z"} ::: clientIP=88.139.93.220 ::: serverIP=2.91.140.191 ::: userName=charlie ::: created_at=2023-05-25T16:14:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T16:14:30.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":606939898,\"originType\":\"Network Devices\",\"internalIp\":\"88.139.93.220\",\"externalIp\":\"2.91.140.191\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T16:14:30.000Z\"} ::: clientIP=88.139.93.220 ::: serverIP=2.91.140.191 ::: userName=charlie ::: created_at=2023-05-25T16:14:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T16:14:30.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-25T16:14:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "88.139.93.220",
"serverIP": "2.91.140.191",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":606939898,"originType":"Network Devices","internalIp":"88.139.93.220","externalIp":"2.91.140.191","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T16:14:30.000Z"} ::: clientIP=88.139.93.220 ::: serverIP=2.91.140.191 ::: userName=charlie ::: created_at=2023-05-25T16:14:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T16:14:30.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":606939898,"originType":"Network Devices","internalIp":"88.139.93.220","externalIp":"2.91.140.191","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T16:14:30.000Z"} ::: clientIP=88.139.93.220 ::: serverIP=2.91.140.191 ::: userName=charlie ::: created_at=2023-05-25T16:14:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T16:14:30.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-25T16:14:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 88.139.93.220
serverIP: 2.91.140.191
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":606939898,"originType":"Network Devices","internalIp":"217.247.34.204","externalIp":"94.199.51.81","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T16:14:30.000Z"} ::: clientIP=217.247.34.204 ::: serverIP=94.199.51.81 ::: userName=bob ::: created_at=2023-05-25T16:14:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T16:14:30.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":606939898,\"originType\":\"Network Devices\",\"internalIp\":\"217.247.34.204\",\"externalIp\":\"94.199.51.81\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T16:14:30.000Z\"} ::: clientIP=217.247.34.204 ::: serverIP=94.199.51.81 ::: userName=bob ::: created_at=2023-05-25T16:14:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T16:14:30.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-25T16:14:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "217.247.34.204",
"serverIP": "94.199.51.81",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":606939898,"originType":"Network Devices","internalIp":"217.247.34.204","externalIp":"94.199.51.81","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T16:14:30.000Z"} ::: clientIP=217.247.34.204 ::: serverIP=94.199.51.81 ::: userName=bob ::: created_at=2023-05-25T16:14:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T16:14:30.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":606939898,"originType":"Network Devices","internalIp":"217.247.34.204","externalIp":"94.199.51.81","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T16:14:30.000Z"} ::: clientIP=217.247.34.204 ::: serverIP=94.199.51.81 ::: userName=bob ::: created_at=2023-05-25T16:14:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T16:14:30.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-25T16:14:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 217.247.34.204
serverIP: 94.199.51.81
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":606659004,"originType":"Network Devices","internalIp":"48.51.172.175","externalIp":"73.174.74.10","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-24T13:52:35.000Z"} ::: clientIP=48.51.172.175 ::: serverIP=73.174.74.10 ::: userName=janedoe ::: created_at=2023-05-24T13:52:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T13:52:35.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":606659004,\"originType\":\"Network Devices\",\"internalIp\":\"48.51.172.175\",\"externalIp\":\"73.174.74.10\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-24T13:52:35.000Z\"} ::: clientIP=48.51.172.175 ::: serverIP=73.174.74.10 ::: userName=janedoe ::: created_at=2023-05-24T13:52:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T13:52:35.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-24T13:52:35.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "48.51.172.175",
"serverIP": "73.174.74.10",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":606659004,"originType":"Network Devices","internalIp":"48.51.172.175","externalIp":"73.174.74.10","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-24T13:52:35.000Z"} ::: clientIP=48.51.172.175 ::: serverIP=73.174.74.10 ::: userName=janedoe ::: created_at=2023-05-24T13:52:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T13:52:35.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":606659004,"originType":"Network Devices","internalIp":"48.51.172.175","externalIp":"73.174.74.10","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-24T13:52:35.000Z"} ::: clientIP=48.51.172.175 ::: serverIP=73.174.74.10 ::: userName=janedoe ::: created_at=2023-05-24T13:52:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T13:52:35.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-24T13:52:35.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 48.51.172.175
serverIP: 73.174.74.10
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":606659004,"originType":"Network Devices","internalIp":"46.140.5.73","externalIp":"114.187.136.60","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-24T13:52:35.000Z"} ::: clientIP=46.140.5.73 ::: serverIP=114.187.136.60 ::: userName=alice ::: created_at=2023-05-24T13:52:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T13:52:35.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":606659004,\"originType\":\"Network Devices\",\"internalIp\":\"46.140.5.73\",\"externalIp\":\"114.187.136.60\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-24T13:52:35.000Z\"} ::: clientIP=46.140.5.73 ::: serverIP=114.187.136.60 ::: userName=alice ::: created_at=2023-05-24T13:52:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T13:52:35.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-24T13:52:35.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "46.140.5.73",
"serverIP": "114.187.136.60",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":606659004,"originType":"Network Devices","internalIp":"46.140.5.73","externalIp":"114.187.136.60","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-24T13:52:35.000Z"} ::: clientIP=46.140.5.73 ::: serverIP=114.187.136.60 ::: userName=alice ::: created_at=2023-05-24T13:52:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T13:52:35.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":606659004,"originType":"Network Devices","internalIp":"46.140.5.73","externalIp":"114.187.136.60","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-24T13:52:35.000Z"} ::: clientIP=46.140.5.73 ::: serverIP=114.187.136.60 ::: userName=alice ::: created_at=2023-05-24T13:52:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T13:52:35.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-24T13:52:35.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 46.140.5.73
serverIP: 114.187.136.60
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"14.121.178.255","externalIp":"92.140.157.252","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-28T20:01:26.000Z"} ::: clientIP=14.121.178.255 ::: serverIP=92.140.157.252 ::: userName=johndoe ::: created_at=2022-07-28T20:01:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T20:01:26.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-28T20:01:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"14.121.178.255\",\"externalIp\":\"92.140.157.252\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captcha4you.top\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-28T20:01:26.000Z\"} ::: clientIP=14.121.178.255 ::: serverIP=92.140.157.252 ::: userName=johndoe ::: created_at=2022-07-28T20:01:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T20:01:26.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "captcha4you.top",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "captcha4you.top",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "14.121.178.255",
"serverIP": "92.140.157.252",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"14.121.178.255","externalIp":"92.140.157.252","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-28T20:01:26.000Z"} ::: clientIP=14.121.178.255 ::: serverIP=92.140.157.252 ::: userName=johndoe ::: created_at=2022-07-28T20:01:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T20:01:26.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"14.121.178.255","externalIp":"92.140.157.252","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-28T20:01:26.000Z"} ::: clientIP=14.121.178.255 ::: serverIP=92.140.157.252 ::: userName=johndoe ::: created_at=2022-07-28T20:01:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T20:01:26.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-28T20:01:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: captcha4you.top
messagetype: firewall_action
severitycode: 2
fqdn: captcha4you.top
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 14.121.178.255
serverIP: 92.140.157.252
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"31.76.216.62","externalIp":"230.89.185.117","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-28T20:01:26.000Z"} ::: clientIP=31.76.216.62 ::: serverIP=230.89.185.117 ::: userName=nighthawk ::: created_at=2022-07-28T20:01:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T20:01:26.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-28T20:01:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"31.76.216.62\",\"externalIp\":\"230.89.185.117\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captcha4you.top\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-28T20:01:26.000Z\"} ::: clientIP=31.76.216.62 ::: serverIP=230.89.185.117 ::: userName=nighthawk ::: created_at=2022-07-28T20:01:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T20:01:26.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "captcha4you.top",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "captcha4you.top",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "31.76.216.62",
"serverIP": "230.89.185.117",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"31.76.216.62","externalIp":"230.89.185.117","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-28T20:01:26.000Z"} ::: clientIP=31.76.216.62 ::: serverIP=230.89.185.117 ::: userName=nighthawk ::: created_at=2022-07-28T20:01:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T20:01:26.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"31.76.216.62","externalIp":"230.89.185.117","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-28T20:01:26.000Z"} ::: clientIP=31.76.216.62 ::: serverIP=230.89.185.117 ::: userName=nighthawk ::: created_at=2022-07-28T20:01:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T20:01:26.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-28T20:01:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: captcha4you.top
messagetype: firewall_action
severitycode: 2
fqdn: captcha4you.top
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 31.76.216.62
serverIP: 230.89.185.117
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"29.157.62.114","externalIp":"120.34.61.251","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-12T20:22:14.000Z"} ::: clientIP=29.157.62.114 ::: serverIP=120.34.61.251 ::: userName=bob ::: created_at=2022-06-12T20:22:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:22:14.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-12T20:22:14.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"29.157.62.114\",\"externalIp\":\"120.34.61.251\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-12T20:22:14.000Z\"} ::: clientIP=29.157.62.114 ::: serverIP=120.34.61.251 ::: userName=bob ::: created_at=2022-06-12T20:22:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:22:14.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "29.157.62.114",
"serverIP": "120.34.61.251",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"29.157.62.114","externalIp":"120.34.61.251","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-12T20:22:14.000Z"} ::: clientIP=29.157.62.114 ::: serverIP=120.34.61.251 ::: userName=bob ::: created_at=2022-06-12T20:22:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:22:14.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"29.157.62.114","externalIp":"120.34.61.251","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-12T20:22:14.000Z"} ::: clientIP=29.157.62.114 ::: serverIP=120.34.61.251 ::: userName=bob ::: created_at=2022-06-12T20:22:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:22:14.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-12T20:22:14.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 29.157.62.114
serverIP: 120.34.61.251
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"15.174.247.54","externalIp":"60.140.128.62","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-12T20:22:14.000Z"} ::: clientIP=15.174.247.54 ::: serverIP=60.140.128.62 ::: userName=nighthawk ::: created_at=2022-06-12T20:22:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:22:14.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-12T20:22:14.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"15.174.247.54\",\"externalIp\":\"60.140.128.62\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-12T20:22:14.000Z\"} ::: clientIP=15.174.247.54 ::: serverIP=60.140.128.62 ::: userName=nighthawk ::: created_at=2022-06-12T20:22:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:22:14.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "15.174.247.54",
"serverIP": "60.140.128.62",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"15.174.247.54","externalIp":"60.140.128.62","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-12T20:22:14.000Z"} ::: clientIP=15.174.247.54 ::: serverIP=60.140.128.62 ::: userName=nighthawk ::: created_at=2022-06-12T20:22:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:22:14.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"15.174.247.54","externalIp":"60.140.128.62","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-12T20:22:14.000Z"} ::: clientIP=15.174.247.54 ::: serverIP=60.140.128.62 ::: userName=nighthawk ::: created_at=2022-06-12T20:22:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:22:14.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-12T20:22:14.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 15.174.247.54
serverIP: 60.140.128.62
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"245.252.244.52","externalIp":"94.206.69.197","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-28T20:01:26.000Z"} ::: clientIP=245.252.244.52 ::: serverIP=94.206.69.197 ::: userName=alice ::: created_at=2022-07-28T20:01:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T20:01:26.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-28T20:01:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"245.252.244.52\",\"externalIp\":\"94.206.69.197\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captcha4you.top\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-28T20:01:26.000Z\"} ::: clientIP=245.252.244.52 ::: serverIP=94.206.69.197 ::: userName=alice ::: created_at=2022-07-28T20:01:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T20:01:26.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "captcha4you.top",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "captcha4you.top",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "245.252.244.52",
"serverIP": "94.206.69.197",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"245.252.244.52","externalIp":"94.206.69.197","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-28T20:01:26.000Z"} ::: clientIP=245.252.244.52 ::: serverIP=94.206.69.197 ::: userName=alice ::: created_at=2022-07-28T20:01:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T20:01:26.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"245.252.244.52","externalIp":"94.206.69.197","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-28T20:01:26.000Z"} ::: clientIP=245.252.244.52 ::: serverIP=94.206.69.197 ::: userName=alice ::: created_at=2022-07-28T20:01:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T20:01:26.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-28T20:01:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: captcha4you.top
messagetype: firewall_action
severitycode: 2
fqdn: captcha4you.top
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 245.252.244.52
serverIP: 94.206.69.197
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"209.167.131.62","externalIp":"87.101.210.42","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-28T20:01:26.000Z"} ::: clientIP=209.167.131.62 ::: serverIP=87.101.210.42 ::: userName=alice ::: created_at=2022-07-28T20:01:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T20:01:26.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-28T20:01:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"209.167.131.62\",\"externalIp\":\"87.101.210.42\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captcha4you.top\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-28T20:01:26.000Z\"} ::: clientIP=209.167.131.62 ::: serverIP=87.101.210.42 ::: userName=alice ::: created_at=2022-07-28T20:01:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T20:01:26.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "captcha4you.top",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "captcha4you.top",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "209.167.131.62",
"serverIP": "87.101.210.42",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"209.167.131.62","externalIp":"87.101.210.42","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-28T20:01:26.000Z"} ::: clientIP=209.167.131.62 ::: serverIP=87.101.210.42 ::: userName=alice ::: created_at=2022-07-28T20:01:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T20:01:26.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"209.167.131.62","externalIp":"87.101.210.42","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-28T20:01:26.000Z"} ::: clientIP=209.167.131.62 ::: serverIP=87.101.210.42 ::: userName=alice ::: created_at=2022-07-28T20:01:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T20:01:26.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-28T20:01:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: captcha4you.top
messagetype: firewall_action
severitycode: 2
fqdn: captcha4you.top
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 209.167.131.62
serverIP: 87.101.210.42
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"184.13.70.66","externalIp":"45.122.212.157","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-12T20:22:14.000Z"} ::: clientIP=184.13.70.66 ::: serverIP=45.122.212.157 ::: userName=johndoe ::: created_at=2022-06-12T20:22:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:22:14.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-12T20:22:14.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"184.13.70.66\",\"externalIp\":\"45.122.212.157\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-12T20:22:14.000Z\"} ::: clientIP=184.13.70.66 ::: serverIP=45.122.212.157 ::: userName=johndoe ::: created_at=2022-06-12T20:22:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:22:14.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "184.13.70.66",
"serverIP": "45.122.212.157",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"184.13.70.66","externalIp":"45.122.212.157","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-12T20:22:14.000Z"} ::: clientIP=184.13.70.66 ::: serverIP=45.122.212.157 ::: userName=johndoe ::: created_at=2022-06-12T20:22:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:22:14.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"184.13.70.66","externalIp":"45.122.212.157","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-12T20:22:14.000Z"} ::: clientIP=184.13.70.66 ::: serverIP=45.122.212.157 ::: userName=johndoe ::: created_at=2022-06-12T20:22:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:22:14.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-12T20:22:14.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 184.13.70.66
serverIP: 45.122.212.157
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"164.182.90.231","externalIp":"233.100.75.125","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-12T20:22:14.000Z"} ::: clientIP=164.182.90.231 ::: serverIP=233.100.75.125 ::: userName=alice ::: created_at=2022-06-12T20:22:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:22:14.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-12T20:22:14.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"164.182.90.231\",\"externalIp\":\"233.100.75.125\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-12T20:22:14.000Z\"} ::: clientIP=164.182.90.231 ::: serverIP=233.100.75.125 ::: userName=alice ::: created_at=2022-06-12T20:22:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:22:14.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "164.182.90.231",
"serverIP": "233.100.75.125",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"164.182.90.231","externalIp":"233.100.75.125","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-12T20:22:14.000Z"} ::: clientIP=164.182.90.231 ::: serverIP=233.100.75.125 ::: userName=alice ::: created_at=2022-06-12T20:22:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:22:14.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"164.182.90.231","externalIp":"233.100.75.125","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-12T20:22:14.000Z"} ::: clientIP=164.182.90.231 ::: serverIP=233.100.75.125 ::: userName=alice ::: created_at=2022-06-12T20:22:14.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:22:14.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-12T20:22:14.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 164.182.90.231
serverIP: 233.100.75.125
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"130.83.245.178","externalIp":"34.195.133.152","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-12T13:27:49.000Z"} ::: clientIP=130.83.245.178 ::: serverIP=34.195.133.152 ::: userName=charlie ::: created_at=2022-05-12T13:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:27:49.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T13:27:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"130.83.245.178\",\"externalIp\":\"34.195.133.152\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T13:27:49.000Z\"} ::: clientIP=130.83.245.178 ::: serverIP=34.195.133.152 ::: userName=charlie ::: created_at=2022-05-12T13:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:27:49.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "130.83.245.178",
"serverIP": "34.195.133.152",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"130.83.245.178","externalIp":"34.195.133.152","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-12T13:27:49.000Z"} ::: clientIP=130.83.245.178 ::: serverIP=34.195.133.152 ::: userName=charlie ::: created_at=2022-05-12T13:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:27:49.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"130.83.245.178","externalIp":"34.195.133.152","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-12T13:27:49.000Z"} ::: clientIP=130.83.245.178 ::: serverIP=34.195.133.152 ::: userName=charlie ::: created_at=2022-05-12T13:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:27:49.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T13:27:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 130.83.245.178
serverIP: 34.195.133.152
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"244.14.247.145","externalIp":"210.131.42.227","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-12T13:27:49.000Z"} ::: clientIP=244.14.247.145 ::: serverIP=210.131.42.227 ::: userName=alice ::: created_at=2022-05-12T13:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:27:49.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T13:27:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"244.14.247.145\",\"externalIp\":\"210.131.42.227\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T13:27:49.000Z\"} ::: clientIP=244.14.247.145 ::: serverIP=210.131.42.227 ::: userName=alice ::: created_at=2022-05-12T13:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:27:49.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "244.14.247.145",
"serverIP": "210.131.42.227",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"244.14.247.145","externalIp":"210.131.42.227","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-12T13:27:49.000Z"} ::: clientIP=244.14.247.145 ::: serverIP=210.131.42.227 ::: userName=alice ::: created_at=2022-05-12T13:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:27:49.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"244.14.247.145","externalIp":"210.131.42.227","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-12T13:27:49.000Z"} ::: clientIP=244.14.247.145 ::: serverIP=210.131.42.227 ::: userName=alice ::: created_at=2022-05-12T13:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:27:49.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T13:27:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 244.14.247.145
serverIP: 210.131.42.227
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"47.49.75.14","externalIp":"166.218.48.154","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-12T13:27:49.000Z"} ::: clientIP=47.49.75.14 ::: serverIP=166.218.48.154 ::: userName=nighthawk ::: created_at=2022-05-12T13:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:27:49.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T13:27:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"47.49.75.14\",\"externalIp\":\"166.218.48.154\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T13:27:49.000Z\"} ::: clientIP=47.49.75.14 ::: serverIP=166.218.48.154 ::: userName=nighthawk ::: created_at=2022-05-12T13:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:27:49.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "47.49.75.14",
"serverIP": "166.218.48.154",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"47.49.75.14","externalIp":"166.218.48.154","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-12T13:27:49.000Z"} ::: clientIP=47.49.75.14 ::: serverIP=166.218.48.154 ::: userName=nighthawk ::: created_at=2022-05-12T13:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:27:49.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"47.49.75.14","externalIp":"166.218.48.154","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-12T13:27:49.000Z"} ::: clientIP=47.49.75.14 ::: serverIP=166.218.48.154 ::: userName=nighthawk ::: created_at=2022-05-12T13:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:27:49.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T13:27:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 47.49.75.14
serverIP: 166.218.48.154
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"180.127.80.204","externalIp":"148.87.241.110","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-12T13:27:49.000Z"} ::: clientIP=180.127.80.204 ::: serverIP=148.87.241.110 ::: userName=alice ::: created_at=2022-05-12T13:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:27:49.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T13:27:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"180.127.80.204\",\"externalIp\":\"148.87.241.110\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T13:27:49.000Z\"} ::: clientIP=180.127.80.204 ::: serverIP=148.87.241.110 ::: userName=alice ::: created_at=2022-05-12T13:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:27:49.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "180.127.80.204",
"serverIP": "148.87.241.110",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"180.127.80.204","externalIp":"148.87.241.110","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-12T13:27:49.000Z"} ::: clientIP=180.127.80.204 ::: serverIP=148.87.241.110 ::: userName=alice ::: created_at=2022-05-12T13:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:27:49.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"180.127.80.204","externalIp":"148.87.241.110","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-12T13:27:49.000Z"} ::: clientIP=180.127.80.204 ::: serverIP=148.87.241.110 ::: userName=alice ::: created_at=2022-05-12T13:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:27:49.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T13:27:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 180.127.80.204
serverIP: 148.87.241.110
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.209.200.228 ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.114","epkey":"EPEMGM0RGICB6UGHC53D","flash_version":"uninstalled","hostname":null,"ip":"179.28.110.6","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pewaynetree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DIJUUWX4H8G09X8JNJVJ","name":"MingApps Production"},"auth_device":{"ip":"174.209.200.228","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"770-316-8074"},"email":"nighthawk@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-07-11T17:51:20.935182+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1657561880,"txid":"2a129595-8e5e-4e27-969a-407de252ddab","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUCDYIHYGDR2GCJGQVB6","name":"nighthawk"}} ::: program=Chrome ::: clientIP=179.28.110.6 ::: userName=nighthawk ::: created_at=1657561880 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561880 ::: clientHostname=770-316-8074 ::: pipelineEntrypoint=dispatch | {
"program": "Chrome",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1657561880",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "174.209.200.228",
"sensitivity": "normal",
"application": "MingApps Production",
"messagetype": "credential_access",
"clienthostname": "770-316-8074",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=174.209.200.228 ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"103.0.5060.114\",\"epkey\":\"EPEMGM0RGICB6UGHC53D\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"179.28.110.6\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Pewaynetree Corners\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"alias\":\"\",\"application\":{\"key\":\"DIJUUWX4H8G09X8JNJVJ\",\"name\":\"MingApps Production\"},\"auth_device\":{\"ip\":\"174.209.200.228\",\"location\":{\"city\":\"Atlanta\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"770-316-8074\"},\"email\":\"nighthawk@wayne.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-07-11T17:51:20.935182+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1657561880,\"txid\":\"2a129595-8e5e-4e27-969a-407de252ddab\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUCDYIHYGDR2GCJGQVB6\",\"name\":\"nighthawk\"}} ::: program=Chrome ::: clientIP=179.28.110.6 ::: userName=nighthawk ::: created_at=1657561880 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561880 ::: clientHostname=770-316-8074 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "179.28.110.6",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.209.200.228 ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.114","epkey":"EPEMGM0RGICB6UGHC53D","flash_version":"uninstalled","hostname":null,"ip":"179.28.110.6","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pewaynetree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DIJUUWX4H8G09X8JNJVJ","name":"MingApps Production"},"auth_device":{"ip":"174.209.200.228","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"770-316-8074"},"email":"nighthawk@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-07-11T17:51:20.935182+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1657561880,"txid":"2a129595-8e5e-4e27-969a-407de252ddab","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUCDYIHYGDR2GCJGQVB6","name":"nighthawk"}} ::: program=Chrome ::: clientIP=179.28.110.6 ::: userName=nighthawk ::: created_at=1657561880 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561880 ::: clientHostname=770-316-8074 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.209.200.228 ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.114","epkey":"EPEMGM0RGICB6UGHC53D","flash_version":"uninstalled","hostname":null,"ip":"179.28.110.6","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pewaynetree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DIJUUWX4H8G09X8JNJVJ","name":"MingApps Production"},"auth_device":{"ip":"174.209.200.228","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"770-316-8074"},"email":"nighthawk@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-07-11T17:51:20.935182+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1657561880,"txid":"2a129595-8e5e-4e27-969a-407de252ddab","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUCDYIHYGDR2GCJGQVB6","name":"nighthawk"}} ::: program=Chrome ::: clientIP=179.28.110.6 ::: userName=nighthawk ::: created_at=1657561880 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561880 ::: clientHostname=770-316-8074 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Chrome
senderhost: localhost
severitylabel: critical
starttimeutc: 1657561880
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 174.209.200.228
sensitivity: normal
application: MingApps Production
messagetype: credential_access
clienthostname: 770-316-8074
streamName: DUO
clientIP: 179.28.110.6
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.209.200.228 ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.114","epkey":"EPEMGM0RGICB6UGHC53D","flash_version":"uninstalled","hostname":null,"ip":"108.222.82.214","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Peacmetree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DIJUUWX4H8G09X8JNJVJ","name":"MingApps Production"},"auth_device":{"ip":"174.209.200.228","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"770-316-8074"},"email":"janedoe@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-07-11T17:51:20.935182+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1657561880,"txid":"2a129595-8e5e-4e27-969a-407de252ddab","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUCDYIHYGDR2GCJGQVB6","name":"janedoe"}} ::: program=Chrome ::: clientIP=108.222.82.214 ::: userName=janedoe ::: created_at=1657561880 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561880 ::: clientHostname=770-316-8074 ::: pipelineEntrypoint=dispatch | {
"program": "Chrome",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1657561880",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "174.209.200.228",
"sensitivity": "normal",
"application": "MingApps Production",
"messagetype": "credential_access",
"clienthostname": "770-316-8074",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=174.209.200.228 ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"103.0.5060.114\",\"epkey\":\"EPEMGM0RGICB6UGHC53D\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"108.222.82.214\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Peacmetree Corners\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"alias\":\"\",\"application\":{\"key\":\"DIJUUWX4H8G09X8JNJVJ\",\"name\":\"MingApps Production\"},\"auth_device\":{\"ip\":\"174.209.200.228\",\"location\":{\"city\":\"Atlanta\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"770-316-8074\"},\"email\":\"janedoe@acme.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-07-11T17:51:20.935182+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1657561880,\"txid\":\"2a129595-8e5e-4e27-969a-407de252ddab\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUCDYIHYGDR2GCJGQVB6\",\"name\":\"janedoe\"}} ::: program=Chrome ::: clientIP=108.222.82.214 ::: userName=janedoe ::: created_at=1657561880 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561880 ::: clientHostname=770-316-8074 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "108.222.82.214",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.209.200.228 ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.114","epkey":"EPEMGM0RGICB6UGHC53D","flash_version":"uninstalled","hostname":null,"ip":"108.222.82.214","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Peacmetree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DIJUUWX4H8G09X8JNJVJ","name":"MingApps Production"},"auth_device":{"ip":"174.209.200.228","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"770-316-8074"},"email":"janedoe@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-07-11T17:51:20.935182+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1657561880,"txid":"2a129595-8e5e-4e27-969a-407de252ddab","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUCDYIHYGDR2GCJGQVB6","name":"janedoe"}} ::: program=Chrome ::: clientIP=108.222.82.214 ::: userName=janedoe ::: created_at=1657561880 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561880 ::: clientHostname=770-316-8074 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.209.200.228 ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.114","epkey":"EPEMGM0RGICB6UGHC53D","flash_version":"uninstalled","hostname":null,"ip":"108.222.82.214","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Peacmetree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DIJUUWX4H8G09X8JNJVJ","name":"MingApps Production"},"auth_device":{"ip":"174.209.200.228","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"770-316-8074"},"email":"janedoe@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-07-11T17:51:20.935182+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1657561880,"txid":"2a129595-8e5e-4e27-969a-407de252ddab","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUCDYIHYGDR2GCJGQVB6","name":"janedoe"}} ::: program=Chrome ::: clientIP=108.222.82.214 ::: userName=janedoe ::: created_at=1657561880 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561880 ::: clientHostname=770-316-8074 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Chrome
senderhost: localhost
severitylabel: critical
starttimeutc: 1657561880
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 174.209.200.228
sensitivity: normal
application: MingApps Production
messagetype: credential_access
clienthostname: 770-316-8074
streamName: DUO
clientIP: 108.222.82.214
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.209.200.228 ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.114","epkey":"EPEMGM0RGICB6UGHC53D","flash_version":"uninstalled","hostname":null,"ip":"58.162.158.104","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Peacmetree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DIJUUWX4H8G09X8JNJVJ","name":"MingApps Production"},"auth_device":{"ip":"174.209.200.228","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"770-316-8074"},"email":"janedoe@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-07-11T17:51:20.935182+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1657561880,"txid":"2a129595-8e5e-4e27-969a-407de252ddab","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUCDYIHYGDR2GCJGQVB6","name":"janedoe"}} ::: program=Chrome ::: clientIP=58.162.158.104 ::: userName=janedoe ::: created_at=1657561880 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561880 ::: clientHostname=770-316-8074 ::: pipelineEntrypoint=dispatch | {
"program": "Chrome",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1657561880",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "174.209.200.228",
"sensitivity": "normal",
"application": "MingApps Production",
"messagetype": "credential_access",
"clienthostname": "770-316-8074",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=174.209.200.228 ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"103.0.5060.114\",\"epkey\":\"EPEMGM0RGICB6UGHC53D\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"58.162.158.104\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Peacmetree Corners\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"alias\":\"\",\"application\":{\"key\":\"DIJUUWX4H8G09X8JNJVJ\",\"name\":\"MingApps Production\"},\"auth_device\":{\"ip\":\"174.209.200.228\",\"location\":{\"city\":\"Atlanta\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"770-316-8074\"},\"email\":\"janedoe@acme.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-07-11T17:51:20.935182+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1657561880,\"txid\":\"2a129595-8e5e-4e27-969a-407de252ddab\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUCDYIHYGDR2GCJGQVB6\",\"name\":\"janedoe\"}} ::: program=Chrome ::: clientIP=58.162.158.104 ::: userName=janedoe ::: created_at=1657561880 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561880 ::: clientHostname=770-316-8074 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "58.162.158.104",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.209.200.228 ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.114","epkey":"EPEMGM0RGICB6UGHC53D","flash_version":"uninstalled","hostname":null,"ip":"58.162.158.104","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Peacmetree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DIJUUWX4H8G09X8JNJVJ","name":"MingApps Production"},"auth_device":{"ip":"174.209.200.228","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"770-316-8074"},"email":"janedoe@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-07-11T17:51:20.935182+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1657561880,"txid":"2a129595-8e5e-4e27-969a-407de252ddab","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUCDYIHYGDR2GCJGQVB6","name":"janedoe"}} ::: program=Chrome ::: clientIP=58.162.158.104 ::: userName=janedoe ::: created_at=1657561880 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561880 ::: clientHostname=770-316-8074 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.209.200.228 ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.114","epkey":"EPEMGM0RGICB6UGHC53D","flash_version":"uninstalled","hostname":null,"ip":"58.162.158.104","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Peacmetree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DIJUUWX4H8G09X8JNJVJ","name":"MingApps Production"},"auth_device":{"ip":"174.209.200.228","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"770-316-8074"},"email":"janedoe@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-07-11T17:51:20.935182+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1657561880,"txid":"2a129595-8e5e-4e27-969a-407de252ddab","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUCDYIHYGDR2GCJGQVB6","name":"janedoe"}} ::: program=Chrome ::: clientIP=58.162.158.104 ::: userName=janedoe ::: created_at=1657561880 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561880 ::: clientHostname=770-316-8074 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Chrome
senderhost: localhost
severitylabel: critical
starttimeutc: 1657561880
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 174.209.200.228
sensitivity: normal
application: MingApps Production
messagetype: credential_access
clienthostname: 770-316-8074
streamName: DUO
clientIP: 58.162.158.104
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Firefox","browser_version":"102.0","epkey":"EPGT8KT1IX1GHBOK2EKN","flash_version":"uninstalled","hostname":null,"ip":"6.123.225.79","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Peoscorptree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DIRNBFP963XVMRGFYYC9","name":"Zoom Meetings SSO"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"alice@oscorp.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-07-11T17:40:05.122833+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1657561205,"txid":"a2d0b66d-7c69-467e-8ece-45f0f314ae9d","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")","DAG-Meraki-RO (from AD sync \"AD Sync\")","SSO-ReadOnly-Org (from AD sync \"AD Sync\")"],"key":"DUU45X7QKX1FSUCR2G9E","name":"alice"}} ::: program=Firefox ::: clientIP=6.123.225.79 ::: userName=alice ::: created_at=1657561205 ::: streamName=DUO ::: application=Zoom Meetings SSO ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561205 ::: pipelineEntrypoint=dispatch | {
"program": "Firefox",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1657561205",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=remembered_device\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":\"Firefox\",\"browser_version\":\"102.0\",\"epkey\":\"EPGT8KT1IX1GHBOK2EKN\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"6.123.225.79\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Peoscorptree Corners\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"alias\":\"\",\"application\":{\"key\":\"DIRNBFP963XVMRGFYYC9\",\"name\":\"Zoom Meetings SSO\"},\"auth_device\":{\"ip\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"alice@oscorp.com\",\"event_type\":\"authentication\",\"factor\":\"remembered_device\",\"isotimestamp\":\"2022-07-11T17:40:05.122833+00:00\",\"ood_software\":null,\"reason\":\"remembered_device\",\"result\":\"success\",\"timestamp\":1657561205,\"txid\":\"a2d0b66d-7c69-467e-8ece-45f0f314ae9d\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\",\"DAG-Meraki-RO (from AD sync \\\"AD Sync\\\")\",\"SSO-ReadOnly-Org (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUU45X7QKX1FSUCR2G9E\",\"name\":\"alice\"}} ::: program=Firefox ::: clientIP=6.123.225.79 ::: userName=alice ::: created_at=1657561205 ::: streamName=DUO ::: application=Zoom Meetings SSO ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561205 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"application": "Zoom Meetings SSO",
"messagetype": "credential_access",
"streamName": "DUO",
"clientIP": "6.123.225.79",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Firefox","browser_version":"102.0","epkey":"EPGT8KT1IX1GHBOK2EKN","flash_version":"uninstalled","hostname":null,"ip":"6.123.225.79","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Peoscorptree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DIRNBFP963XVMRGFYYC9","name":"Zoom Meetings SSO"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"alice@oscorp.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-07-11T17:40:05.122833+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1657561205,"txid":"a2d0b66d-7c69-467e-8ece-45f0f314ae9d","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")","DAG-Meraki-RO (from AD sync \"AD Sync\")","SSO-ReadOnly-Org (from AD sync \"AD Sync\")"],"key":"DUU45X7QKX1FSUCR2G9E","name":"alice"}} ::: program=Firefox ::: clientIP=6.123.225.79 ::: userName=alice ::: created_at=1657561205 ::: streamName=DUO ::: application=Zoom Meetings SSO ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561205 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Firefox","browser_version":"102.0","epkey":"EPGT8KT1IX1GHBOK2EKN","flash_version":"uninstalled","hostname":null,"ip":"6.123.225.79","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Peoscorptree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DIRNBFP963XVMRGFYYC9","name":"Zoom Meetings SSO"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"alice@oscorp.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-07-11T17:40:05.122833+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1657561205,"txid":"a2d0b66d-7c69-467e-8ece-45f0f314ae9d","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")","DAG-Meraki-RO (from AD sync \"AD Sync\")","SSO-ReadOnly-Org (from AD sync \"AD Sync\")"],"key":"DUU45X7QKX1FSUCR2G9E","name":"alice"}} ::: program=Firefox ::: clientIP=6.123.225.79 ::: userName=alice ::: created_at=1657561205 ::: streamName=DUO ::: application=Zoom Meetings SSO ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561205 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Firefox
senderhost: localhost
severitylabel: critical
starttimeutc: 1657561205
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: Zoom Meetings SSO
messagetype: credential_access
streamName: DUO
clientIP: 6.123.225.79
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Firefox","browser_version":"102.0","epkey":"EPGT8KT1IX1GHBOK2EKN","flash_version":"uninstalled","hostname":null,"ip":"62.214.12.14","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Peacmetree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DIRNBFP963XVMRGFYYC9","name":"Zoom Meetings SSO"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@acme.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-07-11T17:40:05.122833+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1657561205,"txid":"a2d0b66d-7c69-467e-8ece-45f0f314ae9d","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")","DAG-Meraki-RO (from AD sync \"AD Sync\")","SSO-ReadOnly-Org (from AD sync \"AD Sync\")"],"key":"DUU45X7QKX1FSUCR2G9E","name":"bob"}} ::: program=Firefox ::: clientIP=62.214.12.14 ::: userName=bob ::: created_at=1657561205 ::: streamName=DUO ::: application=Zoom Meetings SSO ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561205 ::: pipelineEntrypoint=dispatch | {
"program": "Firefox",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1657561205",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=remembered_device\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":\"Firefox\",\"browser_version\":\"102.0\",\"epkey\":\"EPGT8KT1IX1GHBOK2EKN\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"62.214.12.14\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Peacmetree Corners\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"alias\":\"\",\"application\":{\"key\":\"DIRNBFP963XVMRGFYYC9\",\"name\":\"Zoom Meetings SSO\"},\"auth_device\":{\"ip\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"bob@acme.com\",\"event_type\":\"authentication\",\"factor\":\"remembered_device\",\"isotimestamp\":\"2022-07-11T17:40:05.122833+00:00\",\"ood_software\":null,\"reason\":\"remembered_device\",\"result\":\"success\",\"timestamp\":1657561205,\"txid\":\"a2d0b66d-7c69-467e-8ece-45f0f314ae9d\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\",\"DAG-Meraki-RO (from AD sync \\\"AD Sync\\\")\",\"SSO-ReadOnly-Org (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUU45X7QKX1FSUCR2G9E\",\"name\":\"bob\"}} ::: program=Firefox ::: clientIP=62.214.12.14 ::: userName=bob ::: created_at=1657561205 ::: streamName=DUO ::: application=Zoom Meetings SSO ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561205 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"application": "Zoom Meetings SSO",
"messagetype": "credential_access",
"streamName": "DUO",
"clientIP": "62.214.12.14",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Firefox","browser_version":"102.0","epkey":"EPGT8KT1IX1GHBOK2EKN","flash_version":"uninstalled","hostname":null,"ip":"62.214.12.14","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Peacmetree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DIRNBFP963XVMRGFYYC9","name":"Zoom Meetings SSO"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@acme.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-07-11T17:40:05.122833+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1657561205,"txid":"a2d0b66d-7c69-467e-8ece-45f0f314ae9d","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")","DAG-Meraki-RO (from AD sync \"AD Sync\")","SSO-ReadOnly-Org (from AD sync \"AD Sync\")"],"key":"DUU45X7QKX1FSUCR2G9E","name":"bob"}} ::: program=Firefox ::: clientIP=62.214.12.14 ::: userName=bob ::: created_at=1657561205 ::: streamName=DUO ::: application=Zoom Meetings SSO ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561205 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Firefox","browser_version":"102.0","epkey":"EPGT8KT1IX1GHBOK2EKN","flash_version":"uninstalled","hostname":null,"ip":"62.214.12.14","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Peacmetree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DIRNBFP963XVMRGFYYC9","name":"Zoom Meetings SSO"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@acme.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-07-11T17:40:05.122833+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1657561205,"txid":"a2d0b66d-7c69-467e-8ece-45f0f314ae9d","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")","DAG-Meraki-RO (from AD sync \"AD Sync\")","SSO-ReadOnly-Org (from AD sync \"AD Sync\")"],"key":"DUU45X7QKX1FSUCR2G9E","name":"bob"}} ::: program=Firefox ::: clientIP=62.214.12.14 ::: userName=bob ::: created_at=1657561205 ::: streamName=DUO ::: application=Zoom Meetings SSO ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561205 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Firefox
senderhost: localhost
severitylabel: critical
starttimeutc: 1657561205
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: Zoom Meetings SSO
messagetype: credential_access
streamName: DUO
clientIP: 62.214.12.14
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Firefox","browser_version":"102.0","epkey":"EPGT8KT1IX1GHBOK2EKN","flash_version":"uninstalled","hostname":null,"ip":"69.46.152.49","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pestarktree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DIRNBFP963XVMRGFYYC9","name":"Zoom Meetings SSO"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"charlie@stark.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-07-11T17:40:05.122833+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1657561205,"txid":"a2d0b66d-7c69-467e-8ece-45f0f314ae9d","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")","DAG-Meraki-RO (from AD sync \"AD Sync\")","SSO-ReadOnly-Org (from AD sync \"AD Sync\")"],"key":"DUU45X7QKX1FSUCR2G9E","name":"charlie"}} ::: program=Firefox ::: clientIP=69.46.152.49 ::: userName=charlie ::: created_at=1657561205 ::: streamName=DUO ::: application=Zoom Meetings SSO ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561205 ::: pipelineEntrypoint=dispatch | {
"program": "Firefox",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1657561205",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=remembered_device\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":\"Firefox\",\"browser_version\":\"102.0\",\"epkey\":\"EPGT8KT1IX1GHBOK2EKN\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"69.46.152.49\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Pestarktree Corners\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"alias\":\"\",\"application\":{\"key\":\"DIRNBFP963XVMRGFYYC9\",\"name\":\"Zoom Meetings SSO\"},\"auth_device\":{\"ip\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"charlie@stark.com\",\"event_type\":\"authentication\",\"factor\":\"remembered_device\",\"isotimestamp\":\"2022-07-11T17:40:05.122833+00:00\",\"ood_software\":null,\"reason\":\"remembered_device\",\"result\":\"success\",\"timestamp\":1657561205,\"txid\":\"a2d0b66d-7c69-467e-8ece-45f0f314ae9d\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\",\"DAG-Meraki-RO (from AD sync \\\"AD Sync\\\")\",\"SSO-ReadOnly-Org (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUU45X7QKX1FSUCR2G9E\",\"name\":\"charlie\"}} ::: program=Firefox ::: clientIP=69.46.152.49 ::: userName=charlie ::: created_at=1657561205 ::: streamName=DUO ::: application=Zoom Meetings SSO ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561205 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"application": "Zoom Meetings SSO",
"messagetype": "credential_access",
"streamName": "DUO",
"clientIP": "69.46.152.49",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Firefox","browser_version":"102.0","epkey":"EPGT8KT1IX1GHBOK2EKN","flash_version":"uninstalled","hostname":null,"ip":"69.46.152.49","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pestarktree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DIRNBFP963XVMRGFYYC9","name":"Zoom Meetings SSO"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"charlie@stark.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-07-11T17:40:05.122833+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1657561205,"txid":"a2d0b66d-7c69-467e-8ece-45f0f314ae9d","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")","DAG-Meraki-RO (from AD sync \"AD Sync\")","SSO-ReadOnly-Org (from AD sync \"AD Sync\")"],"key":"DUU45X7QKX1FSUCR2G9E","name":"charlie"}} ::: program=Firefox ::: clientIP=69.46.152.49 ::: userName=charlie ::: created_at=1657561205 ::: streamName=DUO ::: application=Zoom Meetings SSO ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561205 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Firefox","browser_version":"102.0","epkey":"EPGT8KT1IX1GHBOK2EKN","flash_version":"uninstalled","hostname":null,"ip":"69.46.152.49","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pestarktree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DIRNBFP963XVMRGFYYC9","name":"Zoom Meetings SSO"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"charlie@stark.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-07-11T17:40:05.122833+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1657561205,"txid":"a2d0b66d-7c69-467e-8ece-45f0f314ae9d","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")","DAG-Meraki-RO (from AD sync \"AD Sync\")","SSO-ReadOnly-Org (from AD sync \"AD Sync\")"],"key":"DUU45X7QKX1FSUCR2G9E","name":"charlie"}} ::: program=Firefox ::: clientIP=69.46.152.49 ::: userName=charlie ::: created_at=1657561205 ::: streamName=DUO ::: application=Zoom Meetings SSO ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1657561205 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Firefox
senderhost: localhost
severitylabel: critical
starttimeutc: 1657561205
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: Zoom Meetings SSO
messagetype: credential_access
streamName: DUO
clientIP: 69.46.152.49
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T14:40:01.932Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T14:40:03.257Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t215.6.75.68\n\tSource Port:\t\t58212\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-DC-04.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"215.6.75.68","IpPort":"58212","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":11768}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":443201376,"task":"Logon"}} | {
"action": "Logon",
"clientport": 58212,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T14:40:01.932Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T14:40:03.257Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t215.6.75.68\\n\\tSource Port:\\t\\t58212\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"NORDC-DC-04.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.umbrella.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"215.6.75.68\",\"IpPort\":\"58212\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":11768}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":443201376,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "443201376",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "215.6.75.68",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T14:40:01.932Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T14:40:03.257Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t215.6.75.68\n\tSource Port:\t\t58212\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-DC-04.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"215.6.75.68","IpPort":"58212","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":11768}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":443201376,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T14:40:01.932Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T14:40:03.257Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t215.6.75.68\n\tSource Port:\t\t58212\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-DC-04.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"215.6.75.68","IpPort":"58212","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":11768}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":443201376,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 58212
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 443201376
streamName: microsoft-windows-security-auditing
clientIP: 215.6.75.68
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T14:40:01.932Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T14:40:03.257Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t96.168.77.155\n\tSource Port:\t\t58212\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-DC-04.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"96.168.77.155","IpPort":"58212","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":11768}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":443201376,"task":"Logon"}} | {
"action": "Logon",
"clientport": 58212,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T14:40:01.932Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T14:40:03.257Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t96.168.77.155\\n\\tSource Port:\\t\\t58212\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"NORDC-DC-04.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.umbrella.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"96.168.77.155\",\"IpPort\":\"58212\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":11768}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":443201376,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "443201376",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "96.168.77.155",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T14:40:01.932Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T14:40:03.257Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t96.168.77.155\n\tSource Port:\t\t58212\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-DC-04.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"96.168.77.155","IpPort":"58212","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":11768}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":443201376,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T14:40:01.932Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T14:40:03.257Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t96.168.77.155\n\tSource Port:\t\t58212\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-DC-04.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"96.168.77.155","IpPort":"58212","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":11768}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":443201376,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 58212
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 443201376
streamName: microsoft-windows-security-auditing
clientIP: 96.168.77.155
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T14:40:01.932Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T14:40:03.257Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t65.221.91.20\n\tSource Port:\t\t58212\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"65.221.91.20","IpPort":"58212","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":11768}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":443201376,"task":"Logon"}} | {
"action": "Logon",
"clientport": 58212,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T14:40:01.932Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T14:40:03.257Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t65.221.91.20\\n\\tSource Port:\\t\\t58212\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"65.221.91.20\",\"IpPort\":\"58212\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":11768}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":443201376,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "443201376",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "65.221.91.20",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T14:40:01.932Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T14:40:03.257Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t65.221.91.20\n\tSource Port:\t\t58212\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"65.221.91.20","IpPort":"58212","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":11768}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":443201376,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T14:40:01.932Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T14:40:03.257Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t65.221.91.20\n\tSource Port:\t\t58212\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"65.221.91.20","IpPort":"58212","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":11768}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":443201376,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 58212
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 443201376
streamName: microsoft-windows-security-auditing
clientIP: 65.221.91.20
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T14:40:01.932Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T14:40:03.257Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t52.225.232.80\n\tSource Port:\t\t58212\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-DC-04.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"52.225.232.80","IpPort":"58212","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":11768}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":443201376,"task":"Logon"}} | {
"action": "Logon",
"clientport": 58212,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T14:40:01.932Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T14:40:03.257Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t52.225.232.80\\n\\tSource Port:\\t\\t58212\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"NORDC-DC-04.stark.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"52.225.232.80\",\"IpPort\":\"58212\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":11768}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":443201376,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "443201376",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "52.225.232.80",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T14:40:01.932Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T14:40:03.257Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t52.225.232.80\n\tSource Port:\t\t58212\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-DC-04.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"52.225.232.80","IpPort":"58212","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":11768}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":443201376,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T14:40:01.932Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T14:40:03.257Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t52.225.232.80\n\tSource Port:\t\t58212\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-DC-04.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"52.225.232.80","IpPort":"58212","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":11768}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":443201376,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 58212
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 443201376
streamName: microsoft-windows-security-auditing
clientIP: 52.225.232.80
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T18:34:41.273Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T18:34:42.641Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t244.83.22.124\n\tSource Port:\t\t49514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"Nordc-DC-03.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"244.83.22.124","IpPort":"49514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":7940}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1283275474,"task":"Logon"}} | {
"action": "Logon",
"clientport": 49514,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T18:34:41.273Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T18:34:42.641Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.wayne.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-BIOSE\\n\\tSource Network Address:\\t244.83.22.124\\n\\tSource Port:\\t\\t49514\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"Nordc-DC-03.wayne.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.wayne.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"244.83.22.124\",\"IpPort\":\"49514\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-BIOSE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":7940}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1283275474,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "Nordc-DC-03.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "1283275474",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "244.83.22.124",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T18:34:41.273Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T18:34:42.641Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t244.83.22.124\n\tSource Port:\t\t49514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"Nordc-DC-03.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"244.83.22.124","IpPort":"49514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":7940}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1283275474,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T18:34:41.273Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T18:34:42.641Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t244.83.22.124\n\tSource Port:\t\t49514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"Nordc-DC-03.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"244.83.22.124","IpPort":"49514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":7940}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1283275474,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 49514
messagetype: auth_failure
productids: [6]
senderhost: Nordc-DC-03.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 1283275474
streamName: microsoft-windows-security-auditing
clientIP: 244.83.22.124
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T18:34:41.273Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T18:34:42.641Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t164.29.130.76\n\tSource Port:\t\t49514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"Nordc-DC-03.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"164.29.130.76","IpPort":"49514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":7940}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1283275474,"task":"Logon"}} | {
"action": "Logon",
"clientport": 49514,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T18:34:41.273Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T18:34:42.641Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-BIOSE\\n\\tSource Network Address:\\t164.29.130.76\\n\\tSource Port:\\t\\t49514\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"Nordc-DC-03.stark.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"164.29.130.76\",\"IpPort\":\"49514\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-BIOSE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":7940}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1283275474,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "Nordc-DC-03.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "1283275474",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "164.29.130.76",
"userName": "bob"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.