question
stringlengths 28
50
| log
stringlengths 688
918
| description
stringlengths 18
1.26k
|
---|---|---|
Print each key and value for the log | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| FUTURE_USE: Oct 4 18:54:26 panmgt01p 1,Receive Time: 2023/10/04 18:54:26,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.146.205,Destination Address: 124.146.215.44,NAT Source IP: 134.7.244.205,NAT Destination IP: 124.146.215.44,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 72568134,Repeat Count: 1,Source Port: 49583,Destination Port: 443,NAT Source Port: 50464,NAT Destination Port: 443,Flags: 0x40441a,Protocol: tcp,Action: allow,Bytes: 7312,Bytes Sent: 2228,Bytes Received: 5084,Packets: 22,Start Time: 2023/10/04 18:53:52,Elapsed Time: 16,Category: business-and-economy,Sequence Number: 7253419119627122716,Source Country: 10.0.0.0-10.255.255.255,Destination Country: Japan,Packets Sent: 12,Packets Received: 10,Session End Reason: tcp-rst-from-client,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl |
What is the FUTURE_USE in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The FUTURE_USE is Oct 4 18:54:26 panmgt01p 1. |
What is the Receive Time in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Receive Time is 2023/10/04 18:54:26. |
What is the Type in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Type is TRAFFIC. |
What is the Threat/Content Type in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Threat/Content Type is end. |
What is the Source Address in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Source Address is 10.130.146.205. |
What is the Destination Address in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Destination Address is 124.146.215.44. |
What is the NAT Source IP in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The NAT Source IP is 134.7.244.205. |
What is the NAT Destination IP in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The NAT Destination IP is 124.146.215.44. |
What is the Rule Name in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Rule Name is Curtin-CS-Research-Out. |
What is the Source User in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Source User is student\XXXXXXXX. |
What is the Application in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Application is ssl. |
What is the Virtual System in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Virtual System is vsys1. |
What is the Source Zone in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Source Zone is bdr-trust. |
What is the Destination Zone in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Destination Zone is bdr-untrust. |
What is the Inbound Interface in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Inbound Interface is ethernet1/23. |
What is the Outbound Interface in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Outbound Interface is ethernet1/24. |
What is the Log Action in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Log Action is SPLUNK LOG FP. |
What is the Session ID in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Session ID is 72568134. |
What is the Repeat Count in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Repeat Count is 1. |
What is the Source Port in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Source Port is 49583. |
What is the Destination Port in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Destination Port is 443. |
What is the NAT Source Port in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The NAT Source Port is 50464. |
What is the NAT Destination Port in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The NAT Destination Port is 443. |
What is the Flags in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Flags is 0x40441a. |
What is the Protocol in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Protocol is tcp. |
What is the Action in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Action is allow. |
What is the Bytes in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Bytes is 7312. |
What is the Bytes Sent in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Bytes Sent is 2228. |
What is the Bytes Received in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Bytes Received is 5084. |
What is the Packets in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Packets is 22. |
What is the Start Time in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Start Time is 2023/10/04 18:53:52. |
What is the Elapsed Time in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Elapsed Time is 16. |
What is the Category in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Category is business-and-economy. |
What is the Sequence Number in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Sequence Number is 7253419119627122716. |
What is the Source Country in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Source Country is 10.0.0.0-10.255.255.255. |
What is the Destination Country in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Destination Country is Japan. |
What is the Packets Sent in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Packets Sent is 12. |
What is the Packets Received in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Packets Received is 10. |
What is the Session End Reason in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Session End Reason is tcp-rst-from-client. |
What is the Application Subcategory in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Application Subcategory is encrypted-tunnel. |
What is the Application Category in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Application Category is networking. |
What is the Application Risk in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Application Risk is 4. |
What is the Application Characteristic in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Application Characteristic is used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use. |
What is the Tunneled Application in the log? | Oct 4 18:54:26 panmgt01p 1,2023/10/04 18:54:26,012501002341,TRAFFIC,end,2561,2023/10/04 18:54:24,10.130.146.205,124.146.215.44,134.7.244.205,124.146.215.44,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:54:24,72568134,1,49583,443,50464,443,0x40441a,tcp,allow,7312,2228,5084,22,2023/10/04 18:53:52,16,business-and-economy,,7253419119627122716,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,12,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:54:25.443+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| The Tunneled Application is ssl. |
Print each key and value for the log | Oct 4 20:18:49 panmgt01p 1,2023/10/04 20:18:49,012501002341,TRAFFIC,end,2561,2023/10/04 20:18:48,10.130.146.10,91.231.195.206,134.7.244.10,91.231.195.206,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 20:18:48,75822148,1,54340,443,44543,443,0x40441c,tcp,allow,9154,3243,5911,23,2023/10/04 20:18:30,1,financial-services,,7253419119672786014,0x8000000000000000,10.0.0.0-10.255.255.255,Israel,,10,13,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T20:18:48.403+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| FUTURE_USE: Oct 4 20:18:49 panmgt01p 1,Receive Time: 2023/10/04 20:18:49,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.146.10,Destination Address: 91.231.195.206,NAT Source IP: 134.7.244.10,NAT Destination IP: 91.231.195.206,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 75822148,Repeat Count: 1,Source Port: 54340,Destination Port: 443,NAT Source Port: 44543,NAT Destination Port: 443,Flags: 0x40441c,Protocol: tcp,Action: allow,Bytes: 9154,Bytes Sent: 3243,Bytes Received: 5911,Packets: 23,Start Time: 2023/10/04 20:18:30,Elapsed Time: 1,Category: financial-services,Sequence Number: 7253419119672786014,Source Country: 10.0.0.0-10.255.255.255,Destination Country: Israel,Packets Sent: 10,Packets Received: 13,Session End Reason: tcp-fin,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl |
Print each key and value for the log | Oct 3 14:42:43 panmgt01p 1,2023/10/03 14:42:42,012501002341,TRAFFIC,end,2561,2023/10/03 14:42:41,10.130.183.226,13.32.127.99,134.7.244.226,13.32.127.99,Curtin-CS-Research-Out,student\XXXXXXXX,,soundcloud-base,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/03 14:42:41,67698056,1,65326,443,13697,443,0x40447a,tcp,allow,9109,2134,6975,25,2023/10/03 14:41:34,67,streaming-media,,7253419118585258215,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,12,13,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-03T14:42:42.378+08:00,,,audio-streaming,media,client-server,2,consume-big-bandwidth able-to-transfer-file pervasive-use,soundcloud,soundcloud-base,no,no,0
| FUTURE_USE: Oct 3 14:42:43 panmgt01p 1,Receive Time: 2023/10/03 14:42:42,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.183.226,Destination Address: 13.32.127.99,NAT Source IP: 134.7.244.226,NAT Destination IP: 13.32.127.99,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: soundcloud-base,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 67698056,Repeat Count: 1,Source Port: 65326,Destination Port: 443,NAT Source Port: 13697,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 9109,Bytes Sent: 2134,Bytes Received: 6975,Packets: 25,Start Time: 2023/10/03 14:41:34,Elapsed Time: 67,Category: streaming-media,Sequence Number: 7253419118585258215,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 12,Packets Received: 13,Session End Reason: tcp-fin,Application Subcategory: audio-streaming,Application Category: media,Application Risk: 2,Application Characteristic: consume-big-bandwidth able-to-transfer-file pervasive-use,Tunneled Application: soundcloud-base |
Print each key and value for the log | Oct 3 22:22:36 panmgt01p 1,2023/10/03 22:22:35,012501002341,THREAT,url,2561,2023/10/03 22:22:33,10.130.140.28,23.220.77.18,134.7.244.28,23.220.77.18,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/03 22:22:33,40903546,1,53760,443,26201,443,0x40f400,tcp,alert,api-shein.shein.com/,9999(9999),shopping,informational,client-to-server,7253419068312870116,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,shopping low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-03T22:22:33.661+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
| FUTURE_USE: Oct 3 22:22:36 panmgt01p 1,Receive Time: 2023/10/03 22:22:35,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.140.28,Destination Address: 23.220.77.18,NAT Source IP: 134.7.244.28,NAT Destination IP: 23.220.77.18,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 40903546,Repeat Count: 1,Source Port: 53760,Destination Port: 443,NAT Source Port: 26201,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: shopping,Sequence Number: 7253419068312870116,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl |
Print each key and value for the log | Oct 6 15:14:32 panmgt01p 1,2023/10/06 15:14:32,012501002341,TRAFFIC,end,2561,2023/10/06 15:14:31,10.130.133.166,119.63.197.139,134.7.244.166,119.63.197.139,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/06 15:14:31,2150055,1,36088,443,25293,443,0x40441c,tcp,allow,2426,1291,1135,21,2023/10/06 15:14:15,1,search-engines,,7253419121148020143,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,11,10,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-06T15:14:31.686+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| FUTURE_USE: Oct 6 15:14:32 panmgt01p 1,Receive Time: 2023/10/06 15:14:32,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.133.166,Destination Address: 119.63.197.139,NAT Source IP: 134.7.244.166,NAT Destination IP: 119.63.197.139,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 2150055,Repeat Count: 1,Source Port: 36088,Destination Port: 443,NAT Source Port: 25293,NAT Destination Port: 443,Flags: 0x40441c,Protocol: tcp,Action: allow,Bytes: 2426,Bytes Sent: 1291,Bytes Received: 1135,Packets: 21,Start Time: 2023/10/06 15:14:15,Elapsed Time: 1,Category: search-engines,Sequence Number: 7253419121148020143,Source Country: 10.0.0.0-10.255.255.255,Destination Country: Japan,Packets Sent: 11,Packets Received: 10,Session End Reason: tcp-rst-from-client,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl |
Print each key and value for the log | Oct 3 14:54:12 panmgt01p 1,2023/10/03 14:54:11,012501002341,THREAT,url,2561,2023/10/03 14:54:10,10.128.79.150,20.150.86.132,134.7.240.150,20.150.86.132,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/03 14:54:10,7959250,1,61368,443,14131,443,0x40f400,tcp,alert,curtinoasis.blob.core.windows.net/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068268248381,0x8000000000000000,10.0.0.0-10.255.255.255,Asia Pacific Region,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,, DOI-DC-List computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-03T14:54:10.876+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
| FUTURE_USE: Oct 3 14:54:12 panmgt01p 1,Receive Time: 2023/10/03 14:54:11,Type: THREAT,Threat/Content Type: url,Source Address: 10.128.79.150,Destination Address: 20.150.86.132,NAT Source IP: 134.7.240.150,NAT Destination IP: 20.150.86.132,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 7959250,Repeat Count: 1,Source Port: 61368,Destination Port: 443,NAT Source Port: 14131,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068268248381,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl |
Print each key and value for the log | Oct 7 03:27:58 panmgt01p 1,2023/10/07 03:27:58,012501002341,TRAFFIC,end,2561,2023/10/07 03:27:57,10.130.154.24,47.246.42.178,134.7.244.24,47.246.42.178,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/07 03:27:57,2618674,1,47270,443,19498,443,0x40447a,tcp,allow,2234,1187,1047,15,2023/10/07 03:27:10,46,society,,7253419121482666306,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,8,7,tcp-rst-from-server,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-07T03:27:57.630+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| FUTURE_USE: Oct 7 03:27:58 panmgt01p 1,Receive Time: 2023/10/07 03:27:58,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.154.24,Destination Address: 47.246.42.178,NAT Source IP: 134.7.244.24,NAT Destination IP: 47.246.42.178,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 2618674,Repeat Count: 1,Source Port: 47270,Destination Port: 443,NAT Source Port: 19498,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 2234,Bytes Sent: 1187,Bytes Received: 1047,Packets: 15,Start Time: 2023/10/07 03:27:10,Elapsed Time: 46,Category: society,Sequence Number: 7253419121482666306,Source Country: 10.0.0.0-10.255.255.255,Destination Country: Australia,Packets Sent: 8,Packets Received: 7,Session End Reason: tcp-rst-from-server,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl |
Print each key and value for the log | Oct 6 08:16:16 panmgt01p 1,2023/10/06 08:16:16,012501002341,TRAFFIC,end,2561,2023/10/06 08:16:13,10.130.140.82,17.248.219.1,134.7.244.82,17.248.219.1,Curtin-CS-Research-Out,student\XXXXXXXX,,icloud-base,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/06 08:16:13,2892718,1,49773,443,11765,443,0x40447a,tcp,allow,6183,1183,5000,18,2023/10/06 08:15:49,25,online-storage-and-backup,,7253419120805391335,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,9,9,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-06T08:16:14.790+08:00,,,internet-utility,saas,client-server,2,able-to-transfer-file pervasive-use is-saas no-certifications,icloud,icloud-base,yes,no,0
| FUTURE_USE: Oct 6 08:16:16 panmgt01p 1,Receive Time: 2023/10/06 08:16:16,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.140.82,Destination Address: 17.248.219.1,NAT Source IP: 134.7.244.82,NAT Destination IP: 17.248.219.1,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: icloud-base,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 2892718,Repeat Count: 1,Source Port: 49773,Destination Port: 443,NAT Source Port: 11765,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 6183,Bytes Sent: 1183,Bytes Received: 5000,Packets: 18,Start Time: 2023/10/06 08:15:49,Elapsed Time: 25,Category: online-storage-and-backup,Sequence Number: 7253419120805391335,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 9,Packets Received: 9,Session End Reason: tcp-fin,Application Subcategory: internet-utility,Application Category: saas,Application Risk: 2,Application Characteristic: able-to-transfer-file pervasive-use is-saas no-certifications,Tunneled Application: icloud-base |
Print each key and value for the log | Oct 3 14:39:00 panmgt01p 1,2023/10/03 14:39:00,012501002341,THREAT,url,2561,2023/10/03 14:38:58,10.130.159.43,52.226.139.180,134.7.244.43,52.226.139.180,Curtin-CS-Research-Out,student\XXXXXXXX,,windows-push-notifications,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/03 14:38:58,75424458,1,49496,443,12878,443,0x40f400,tcp,alert,client.wns.windows.com/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068265962840,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-03T14:38:58.820+08:00,,,,internet-utility,general-internet,client-server,1,pervasive-use,,windows-push-notifications,no,no,
| FUTURE_USE: Oct 3 14:39:00 panmgt01p 1,Receive Time: 2023/10/03 14:39:00,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.159.43,Destination Address: 52.226.139.180,NAT Source IP: 134.7.244.43,NAT Destination IP: 52.226.139.180,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: windows-push-notifications,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 75424458,Repeat Count: 1,Source Port: 49496,Destination Port: 443,NAT Source Port: 12878,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068265962840,Application Subcategory: internet-utility,Application Category: general-internet,Application Risk: 1,Application Characteristic: pervasive-use,Tunneled Application: windows-push-notifications |
Print each key and value for the log | Oct 1 16:23:48 panmgt01p 1,2023/10/01 16:23:48,012501002341,TRAFFIC,end,2561,2023/10/01 16:23:46,10.130.223.251,36.150.141.86,134.7.244.251,36.150.141.86,Curtin-CS-Research-Out,student\XXXXXXXX,,web-browsing,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/01 16:23:46,35561057,1,48074,80,3360,80,0x40401c,tcp,allow,1581,773,808,12,2023/10/01 16:23:32,4,computer-and-internet-info,,7253419117005837798,0x8000000000000000,10.0.0.0-10.255.255.255,China,,6,6,tcp-rst-from-server,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-01T16:23:47.872+08:00,,,internet-utility,general-internet,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,web-browsing,no,no,0
| FUTURE_USE: Oct 1 16:23:48 panmgt01p 1,Receive Time: 2023/10/01 16:23:48,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.223.251,Destination Address: 36.150.141.86,NAT Source IP: 134.7.244.251,NAT Destination IP: 36.150.141.86,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: web-browsing,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 35561057,Repeat Count: 1,Source Port: 48074,Destination Port: 80,NAT Source Port: 3360,NAT Destination Port: 80,Flags: 0x40401c,Protocol: tcp,Action: allow,Bytes: 1581,Bytes Sent: 773,Bytes Received: 808,Packets: 12,Start Time: 2023/10/01 16:23:32,Elapsed Time: 4,Category: computer-and-internet-info,Sequence Number: 7253419117005837798,Source Country: 10.0.0.0-10.255.255.255,Destination Country: China,Packets Sent: 6,Packets Received: 6,Session End Reason: tcp-rst-from-server,Application Subcategory: internet-utility,Application Category: general-internet,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: web-browsing |
Print each key and value for the log | Oct 5 16:58:44 panmgt01p 1,2023/10/05 16:58:44,012501002341,TRAFFIC,end,2561,2023/10/05 16:58:43,10.130.177.170,172.217.24.42,134.7.244.170,172.217.24.42,Curtin-CS-Research-Out,student\XXXXXXXX,,google-base,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/05 16:58:43,39070189,1,54370,443,42492,443,0x40447a,tcp,allow,6653,1229,5424,17,2023/10/05 16:56:31,130,computer-and-internet-info,,7253419120416930821,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,9,8,unknown,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-05T16:58:44.213+08:00,,,internet-utility,general-internet,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,google-base,no,no,0
| FUTURE_USE: Oct 5 16:58:44 panmgt01p 1,Receive Time: 2023/10/05 16:58:44,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.177.170,Destination Address: 172.217.24.42,NAT Source IP: 134.7.244.170,NAT Destination IP: 172.217.24.42,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: google-base,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 39070189,Repeat Count: 1,Source Port: 54370,Destination Port: 443,NAT Source Port: 42492,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 6653,Bytes Sent: 1229,Bytes Received: 5424,Packets: 17,Start Time: 2023/10/05 16:56:31,Elapsed Time: 130,Category: computer-and-internet-info,Sequence Number: 7253419120416930821,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 9,Packets Received: 8,Session End Reason: unknown,Application Subcategory: internet-utility,Application Category: general-internet,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: google-base |
Print each key and value for the log | Oct 1 17:07:54 panmgt01p 1,2023/10/01 17:07:53,012501002341,THREAT,url,2561,2023/10/01 17:07:50,10.130.163.185,47.91.29.81,134.7.244.185,47.91.29.81,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/01 17:07:50,77428815,1,62720,443,19270,443,0x40f400,tcp,alert,dict.youdao.com/,9999(9999),reference-and-research,informational,client-to-server,7253419068006631934,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,reference-and-research low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-01T17:07:50.047+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
| FUTURE_USE: Oct 1 17:07:54 panmgt01p 1,Receive Time: 2023/10/01 17:07:53,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.163.185,Destination Address: 47.91.29.81,NAT Source IP: 134.7.244.185,NAT Destination IP: 47.91.29.81,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 77428815,Repeat Count: 1,Source Port: 62720,Destination Port: 443,NAT Source Port: 19270,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: reference-and-research,Sequence Number: 7253419068006631934,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl |
Print each key and value for the log | Oct 4 17:43:37 panmgt01p 1,2023/10/04 17:43:36,012501002341,TRAFFIC,end,2561,2023/10/04 17:43:35,10.130.139.86,20.197.103.14,134.7.244.86,20.197.103.14,Curtin-CS-Research-Out,student\XXXXXXXX,,ms-product-activation,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 17:43:35,2528085,1,59476,443,13714,443,0x40447a,tcp,allow,15066,3514,11552,30,2023/10/04 17:43:18,15,computer-and-internet-info,,7253419119584450679,0x8000000000000000,10.0.0.0-10.255.255.255,Asia Pacific Region,,14,16,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T17:43:36.223+08:00,,,software-update,business-systems,client-server,1,pervasive-use,,ms-product-activation,no,no,0
| FUTURE_USE: Oct 4 17:43:37 panmgt01p 1,Receive Time: 2023/10/04 17:43:36,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.139.86,Destination Address: 20.197.103.14,NAT Source IP: 134.7.244.86,NAT Destination IP: 20.197.103.14,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ms-product-activation,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 2528085,Repeat Count: 1,Source Port: 59476,Destination Port: 443,NAT Source Port: 13714,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 15066,Bytes Sent: 3514,Bytes Received: 11552,Packets: 30,Start Time: 2023/10/04 17:43:18,Elapsed Time: 15,Category: computer-and-internet-info,Sequence Number: 7253419119584450679,Source Country: 10.0.0.0-10.255.255.255,Destination Country: Asia Pacific Region,Packets Sent: 14,Packets Received: 16,Session End Reason: tcp-rst-from-client,Application Subcategory: software-update,Application Category: business-systems,Application Risk: 1,Application Characteristic: pervasive-use,Tunneled Application: ms-product-activation |
Print each key and value for the log | Oct 6 10:44:23 panmgt01p 1,2023/10/06 10:44:22,012501002341,THREAT,url,2561,2023/10/06 10:44:21,10.130.175.46,172.217.24.46,134.7.244.46,172.217.24.46,Curtin-CS-Research-Out,student\XXXXXXXX,,google-analytics,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/06 10:44:21,37307506,1,56489,443,19309,443,0x40f400,tcp,alert,www.google-analytics.com/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068645485262,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-06T10:44:21.517+08:00,,,,internet-utility,general-internet,browser-based,2,evasive-behavior pervasive-use is-saas no-certifications,,google-analytics,yes,no,
| FUTURE_USE: Oct 6 10:44:23 panmgt01p 1,Receive Time: 2023/10/06 10:44:22,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.175.46,Destination Address: 172.217.24.46,NAT Source IP: 134.7.244.46,NAT Destination IP: 172.217.24.46,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: google-analytics,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 37307506,Repeat Count: 1,Source Port: 56489,Destination Port: 443,NAT Source Port: 19309,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068645485262,Application Subcategory: internet-utility,Application Category: general-internet,Application Risk: 2,Application Characteristic: evasive-behavior pervasive-use is-saas no-certifications,Tunneled Application: google-analytics |
Print each key and value for the log | Oct 5 21:31:41 panmgt01p 1,2023/10/05 21:31:41,012501002341,THREAT,url,2561,2023/10/05 21:31:38,10.130.170.4,157.240.8.1,134.7.244.4,157.240.8.1,Curtin-CS-Research-Out,student\XXXXXXXX,,instagram-base,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/05 21:31:38,74389843,1,50475,443,15016,443,0x40f400,tcp,alert,gateway.instagram.com/,9999(9999),social-networking,informational,client-to-server,7253419068585881655,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,social-networking low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-05T21:31:38.674+08:00,,,,photo-video,media,client-server,2,able-to-transfer-file pervasive-use is-saas no-certifications,instagram,instagram-base,yes,no,
| FUTURE_USE: Oct 5 21:31:41 panmgt01p 1,Receive Time: 2023/10/05 21:31:41,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.170.4,Destination Address: 157.240.8.1,NAT Source IP: 134.7.244.4,NAT Destination IP: 157.240.8.1,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: instagram-base,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 74389843,Repeat Count: 1,Source Port: 50475,Destination Port: 443,NAT Source Port: 15016,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: social-networking,Sequence Number: 7253419068585881655,Application Subcategory: photo-video,Application Category: media,Application Risk: 2,Application Characteristic: able-to-transfer-file pervasive-use is-saas no-certifications,Tunneled Application: instagram-base |
Print each key and value for the log | Oct 7 15:12:31 panmgt01p 1,2023/10/07 15:12:31,012501002341,THREAT,url,2561,2023/10/07 15:12:30,10.130.173.20,23.223.225.107,134.7.244.20,23.223.225.107,Curtin-CS-Research-Out,student\XXXXXXXX,,apple-maps,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/07 15:12:30,77979107,1,52792,443,18397,443,0x40f400,tcp,alert,configuration.ls.apple.com/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068780709394,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-07T15:12:30.624+08:00,,,,internet-utility,general-internet,client-server,1,consume-big-bandwidth pervasive-use,,apple-maps,no,no,
| FUTURE_USE: Oct 7 15:12:31 panmgt01p 1,Receive Time: 2023/10/07 15:12:31,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.173.20,Destination Address: 23.223.225.107,NAT Source IP: 134.7.244.20,NAT Destination IP: 23.223.225.107,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: apple-maps,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 77979107,Repeat Count: 1,Source Port: 52792,Destination Port: 443,NAT Source Port: 18397,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068780709394,Application Subcategory: internet-utility,Application Category: general-internet,Application Risk: 1,Application Characteristic: consume-big-bandwidth pervasive-use,Tunneled Application: apple-maps |
Print each key and value for the log | Oct 7 11:23:21 panmgt01p 1,2023/10/07 11:23:21,012501002341,TRAFFIC,end,2561,2023/10/07 11:23:18,10.130.152.229,104.18.131.236,134.7.244.229,104.18.131.236,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/07 11:23:18,72225322,1,62032,443,21532,443,0x40447a,tcp,allow,3624,2013,1611,25,2023/10/07 11:20:13,185,content-delivery-networks,,7253419121635041143,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,14,11,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-07T11:23:19.391+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| FUTURE_USE: Oct 7 11:23:21 panmgt01p 1,Receive Time: 2023/10/07 11:23:21,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.152.229,Destination Address: 104.18.131.236,NAT Source IP: 134.7.244.229,NAT Destination IP: 104.18.131.236,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 72225322,Repeat Count: 1,Source Port: 62032,Destination Port: 443,NAT Source Port: 21532,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 3624,Bytes Sent: 2013,Bytes Received: 1611,Packets: 25,Start Time: 2023/10/07 11:20:13,Elapsed Time: 185,Category: content-delivery-networks,Sequence Number: 7253419121635041143,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 14,Packets Received: 11,Session End Reason: tcp-fin,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl |
Print each key and value for the log | Oct 4 10:00:41 panmgt01p 1,2023/10/04 10:00:40,012501002341,TRAFFIC,end,2561,2023/10/04 10:00:40,10.130.184.78,13.107.21.239,134.7.244.78,13.107.21.239,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 10:00:40,4269052,1,56189,443,16294,443,0x40447a,tcp,allow,9722,2107,7615,26,2023/10/04 10:00:21,16,computer-and-internet-info,,7253419119181189503,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,11,15,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T10:00:40.503+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
| FUTURE_USE: Oct 4 10:00:41 panmgt01p 1,Receive Time: 2023/10/04 10:00:40,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.184.78,Destination Address: 13.107.21.239,NAT Source IP: 134.7.244.78,NAT Destination IP: 13.107.21.239,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 4269052,Repeat Count: 1,Source Port: 56189,Destination Port: 443,NAT Source Port: 16294,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 9722,Bytes Sent: 2107,Bytes Received: 7615,Packets: 26,Start Time: 2023/10/04 10:00:21,Elapsed Time: 16,Category: computer-and-internet-info,Sequence Number: 7253419119181189503,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 11,Packets Received: 15,Session End Reason: tcp-fin,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl |
Print each key and value for the log | Oct 4 18:07:39 panmgt01p 1,2023/10/04 18:07:38,012501002341,TRAFFIC,end,2561,2023/10/04 18:07:38,10.130.154.35,35.172.69.50,134.7.244.35,35.172.69.50,Curtin-CS-Research-Out,student\XXXXXXXX,,non-syn-tcp,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 18:07:38,29258,1,59851,443,11496,443,0x40401a,tcp,allow,149,149,0,2,2023/10/04 18:07:31,0,any,,7253419119599792482,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,2,0,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T18:07:39.242+08:00,,,unknown,unknown,unknown,1,,,non-syn-tcp,no,no,0
| FUTURE_USE: Oct 4 18:07:39 panmgt01p 1,Receive Time: 2023/10/04 18:07:38,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.154.35,Destination Address: 35.172.69.50,NAT Source IP: 134.7.244.35,NAT Destination IP: 35.172.69.50,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: non-syn-tcp,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 29258,Repeat Count: 1,Source Port: 59851,Destination Port: 443,NAT Source Port: 11496,NAT Destination Port: 443,Flags: 0x40401a,Protocol: tcp,Action: allow,Bytes: 149,Bytes Sent: 149,Bytes Received: 0,Packets: 2,Start Time: 2023/10/04 18:07:31,Elapsed Time: 0,Category: any,Sequence Number: 7253419119599792482,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 2,Packets Received: 0,Session End Reason: tcp-rst-from-client,Application Subcategory: unknown,Application Category: unknown,Application Risk: 1,Tunneled Application: non-syn-tcp |
Print each key and value for the log | Oct 4 10:42:52 panmgt01p 1,2023/10/04 10:42:51,012501002341,TRAFFIC,end,2561,2023/10/04 10:42:52,10.130.147.182,66.225.223.63,134.7.244.182,66.225.223.63,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 10:42:52,67429572,1,55805,443,13668,443,0x40441c,tcp,allow,5395,1285,4110,15,2023/10/04 10:42:31,4,business-and-economy,,7253419119219607823,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,9,6,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T10:42:52.391+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0 | FUTURE_USE: Oct 4 10:42:52 panmgt01p 1,Receive Time: 2023/10/04 10:42:51,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.147.182,Destination Address: 66.225.223.63,NAT Source IP: 134.7.244.182,NAT Destination IP: 66.225.223.63,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 67429572,Repeat Count: 1,Source Port: 55805,Destination Port: 443,NAT Source Port: 13668,NAT Destination Port: 443,Flags: 0x40441c,Protocol: tcp,Action: allow,Bytes: 5395,Bytes Sent: 1285,Bytes Received: 4110,Packets: 15,Start Time: 2023/10/04 10:42:31,Elapsed Time: 4,Category: business-and-economy,Sequence Number: 7253419119219607823,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 9,Packets Received: 6,Session End Reason: tcp-fin,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl |
README.md exists but content is empty.
Use the Edit dataset card button to edit it.
- Downloads last month
- 44