Dataset Preview
Full Screen
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
Commit 0/1 could not be created on the Hub (after 6 attempts).
Error code:   CreateCommitError

Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.

question
string
log
string
description
string
Print each key and value for the log
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
FUTURE_USE: Oct 4 14:12:26 panmgt01p 1,Receive Time: 2023/10/04 14:12:25,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.187.153,Destination Address: 35.186.224.39,NAT Source IP: 134.7.244.153,NAT Destination IP: 35.186.224.39,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 39173760,Repeat Count: 1,Source Port: 52817,Destination Port: 443,NAT Source Port: 47061,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: streaming-media,Sequence Number: 7253419068399862320,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
What is the FUTURE_USE in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The FUTURE_USE is Oct 4 14:12:26 panmgt01p 1.
What is the Receive Time in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Receive Time is 2023/10/04 14:12:25.
What is the Type in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Type is THREAT.
What is the Threat/Content Type in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Threat/Content Type is url.
What is the Source Address in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Source Address is 10.130.187.153.
What is the Destination Address in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Destination Address is 35.186.224.39.
What is the NAT Source IP in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The NAT Source IP is 134.7.244.153.
What is the NAT Destination IP in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The NAT Destination IP is 35.186.224.39.
What is the Rule Name in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Rule Name is Curtin-CS-Research-Out.
What is the Source User in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Source User is student\XXXXXXXX.
What is the Application in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Application is ssl.
What is the Virtual System in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Virtual System is vsys1.
What is the Source Zone in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Source Zone is bdr-trust.
What is the Destination Zone in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Destination Zone is bdr-untrust.
What is the Inbound Interface in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Inbound Interface is ethernet1/23.
What is the Outbound Interface in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Outbound Interface is ethernet1/24.
What is the Log Action in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Log Action is SPLUNK LOG FP.
What is the Session ID in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Session ID is 39173760.
What is the Repeat Count in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Repeat Count is 1.
What is the Source Port in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Source Port is 52817.
What is the Destination Port in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Destination Port is 443.
What is the NAT Source Port in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The NAT Source Port is 47061.
What is the NAT Destination Port in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The NAT Destination Port is 443.
What is the Flags in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Flags is 0x40f400.
What is the Action in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Action is alert.
What is the Category in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Category is streaming-media.
What is the Sequence Number in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Sequence Number is 7253419068399862320.
What is the Application Subcategory in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Application Subcategory is encrypted-tunnel.
What is the Application Category in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Application Category is networking.
What is the Application Risk in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Application Risk is 4.
What is the Application Characteristic in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Application Characteristic is used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use.
What is the Tunneled Application in the log?
Oct 4 14:12:26 panmgt01p 1,2023/10/04 14:12:25,012501002341,THREAT,url,2561,2023/10/04 14:12:24,10.130.187.153,35.186.224.39,134.7.244.153,35.186.224.39,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 14:12:24,39173760,1,52817,443,47061,443,0x40f400,tcp,alert,gae2-dealer.spotify.com/,9999(9999),streaming-media,informational,client-to-server,7253419068399862320,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,streaming-media low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T14:12:24.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
The Tunneled Application is ssl.
Print each key and value for the log
Oct 1 11:42:38 panmgt01p 1,2023/10/01 11:42:37,012501002341,TRAFFIC,end,2561,2023/10/01 11:42:36,10.130.184.244,157.240.8.52,134.7.244.244,157.240.8.52,Curtin-CS-Research-Out,student\XXXXXXXX,,instagram-base,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/01 11:42:36,42119529,1,53076,443,41288,443,0x40447a,tcp,allow,2431,1208,1223,19,2023/10/01 11:39:32,185,social-networking,,7253419116872978095,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,10,9,aged-out,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-01T11:42:37.588+08:00,,,photo-video,media,client-server,2,able-to-transfer-file pervasive-use is-saas no-certifications,instagram,instagram-base,yes,no,0
FUTURE_USE: Oct 1 11:42:38 panmgt01p 1,Receive Time: 2023/10/01 11:42:37,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.184.244,Destination Address: 157.240.8.52,NAT Source IP: 134.7.244.244,NAT Destination IP: 157.240.8.52,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: instagram-base,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 42119529,Repeat Count: 1,Source Port: 53076,Destination Port: 443,NAT Source Port: 41288,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 2431,Bytes Sent: 1208,Bytes Received: 1223,Packets: 19,Start Time: 2023/10/01 11:39:32,Elapsed Time: 185,Category: social-networking,Sequence Number: 7253419116872978095,Source Country: 10.0.0.0-10.255.255.255,Destination Country: Australia,Packets Sent: 10,Packets Received: 9,Session End Reason: aged-out,Application Subcategory: photo-video,Application Category: media,Application Risk: 2,Application Characteristic: able-to-transfer-file pervasive-use is-saas no-certifications,Tunneled Application: instagram-base
Print each key and value for the log
Oct 7 15:38:57 panmgt01p 1,2023/10/07 15:38:57,012501002341,THREAT,url,2561,2023/10/07 15:38:54,10.130.137.187,17.248.219.2,134.7.244.187,17.248.219.2,Curtin-CS-Research-Out,student\XXXXXXXX,,icloud-base,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/07 15:38:54,33722616,1,56394,443,49151,443,0x40f400,tcp,alert,p31-contacts.icloud.com/,9999(9999),online-storage-and-backup,informational,client-to-server,7253419068782714093,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,online-storage-and-backup low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-07T15:38:54.720+08:00,,,,internet-utility,saas,client-server,2,able-to-transfer-file pervasive-use is-saas no-certifications,icloud,icloud-base,yes,no,
FUTURE_USE: Oct 7 15:38:57 panmgt01p 1,Receive Time: 2023/10/07 15:38:57,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.137.187,Destination Address: 17.248.219.2,NAT Source IP: 134.7.244.187,NAT Destination IP: 17.248.219.2,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: icloud-base,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 33722616,Repeat Count: 1,Source Port: 56394,Destination Port: 443,NAT Source Port: 49151,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: online-storage-and-backup,Sequence Number: 7253419068782714093,Application Subcategory: internet-utility,Application Category: saas,Application Risk: 2,Application Characteristic: able-to-transfer-file pervasive-use is-saas no-certifications,Tunneled Application: icloud-base
Print each key and value for the log
Oct 4 07:09:22 panmgt01p 1,2023/10/04 07:09:21,012501002341,THREAT,url,2561,2023/10/04 07:09:15,134.7.214.25,40.99.134.18,0.0.0.0,0.0.0.0,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 07:09:15,74442516,1,56159,443,0,0,0xf400,tcp,alert,substrate.office.com/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068344762969,0x8000000000000000,Australia,Australia,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T07:09:15.423+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
FUTURE_USE: Oct 4 07:09:22 panmgt01p 1,Receive Time: 2023/10/04 07:09:21,Type: THREAT,Threat/Content Type: url,Source Address: 134.7.214.25,Destination Address: 40.99.134.18,NAT Source IP: 0.0.0.0,NAT Destination IP: 0.0.0.0,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 74442516,Repeat Count: 1,Source Port: 56159,Destination Port: 443,NAT Source Port: 0,NAT Destination Port: 0,Flags: 0xf400,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068344762969,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 3 21:42:35 panmgt01p 1,2023/10/03 21:42:35,012501002341,THREAT,url,2561,2023/10/03 21:42:33,10.130.138.146,13.107.138.8,134.7.244.146,13.107.138.8,Curtin-CS-Research-Out,student\XXXXXXXX,,ms-onedrive-business,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/03 21:42:33,36994163,1,61254,443,9202,443,0x40f400,tcp,alert,santamariacollege-my.sharepoint.com/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068309914199,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-03T21:42:33.386+08:00,,,,file-sharing,saas,client-server,4,consume-big-bandwidth able-to-transfer-file has-known-vulnerability prone-to-misuse pervasive-use is-saas no-certifications,ms-office365,ms-onedrive-business,yes,no,
FUTURE_USE: Oct 3 21:42:35 panmgt01p 1,Receive Time: 2023/10/03 21:42:35,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.138.146,Destination Address: 13.107.138.8,NAT Source IP: 134.7.244.146,NAT Destination IP: 13.107.138.8,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ms-onedrive-business,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 36994163,Repeat Count: 1,Source Port: 61254,Destination Port: 443,NAT Source Port: 9202,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068309914199,Application Subcategory: file-sharing,Application Category: saas,Application Risk: 4,Application Characteristic: consume-big-bandwidth able-to-transfer-file has-known-vulnerability prone-to-misuse pervasive-use is-saas no-certifications,Tunneled Application: ms-onedrive-business
Print each key and value for the log
Oct 4 13:28:09 panmgt01p 1,2023/10/04 13:28:09,012501002341,TRAFFIC,end,2561,2023/10/04 13:28:08,10.130.134.29,23.215.138.53,134.7.244.29,23.215.138.53,Curtin-CS-Research-Out,student\XXXXXXXX,,web-browsing,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 13:28:08,10763872,1,50300,80,59383,80,0x40401c,tcp,allow,1894,1251,643,10,2023/10/04 13:27:51,0,computer-and-internet-info,,7253419119370194098,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,5,5,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T13:28:09.113+08:00,,,internet-utility,general-internet,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,web-browsing,no,no,0
FUTURE_USE: Oct 4 13:28:09 panmgt01p 1,Receive Time: 2023/10/04 13:28:09,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.134.29,Destination Address: 23.215.138.53,NAT Source IP: 134.7.244.29,NAT Destination IP: 23.215.138.53,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: web-browsing,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 10763872,Repeat Count: 1,Source Port: 50300,Destination Port: 80,NAT Source Port: 59383,NAT Destination Port: 80,Flags: 0x40401c,Protocol: tcp,Action: allow,Bytes: 1894,Bytes Sent: 1251,Bytes Received: 643,Packets: 10,Start Time: 2023/10/04 13:27:51,Elapsed Time: 0,Category: computer-and-internet-info,Sequence Number: 7253419119370194098,Source Country: 10.0.0.0-10.255.255.255,Destination Country: Australia,Packets Sent: 5,Packets Received: 5,Session End Reason: tcp-fin,Application Subcategory: internet-utility,Application Category: general-internet,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: web-browsing
Print each key and value for the log
Oct 5 20:48:56 panmgt01p 1,2023/10/05 20:48:56,012501002341,THREAT,url,2561,2023/10/05 20:48:52,10.130.145.52,20.190.142.169,134.7.244.52,20.190.142.169,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/05 20:48:52,68416766,1,59394,443,47262,443,0x40f400,tcp,alert,graph.microsoft.com/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068582632000,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-05T20:48:52.576+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
FUTURE_USE: Oct 5 20:48:56 panmgt01p 1,Receive Time: 2023/10/05 20:48:56,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.145.52,Destination Address: 20.190.142.169,NAT Source IP: 134.7.244.52,NAT Destination IP: 20.190.142.169,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 68416766,Repeat Count: 1,Source Port: 59394,Destination Port: 443,NAT Source Port: 47262,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068582632000,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 4 16:36:13 panmgt01p 1,2023/10/04 16:36:13,012501002341,THREAT,url,2561,2023/10/04 16:36:12,10.128.55.15,185.184.10.30,134.7.240.15,185.184.10.30,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 16:36:12,73455158,1,64964,443,1291,443,0x40f400,tcp,alert,us.creativecdn.com/,9999(9999),business-and-economy,informational,client-to-server,7253419068419885138,0x8000000000000000,10.0.0.0-10.255.255.255,Poland,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,business-and-economy low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T16:36:12.454+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
FUTURE_USE: Oct 4 16:36:13 panmgt01p 1,Receive Time: 2023/10/04 16:36:13,Type: THREAT,Threat/Content Type: url,Source Address: 10.128.55.15,Destination Address: 185.184.10.30,NAT Source IP: 134.7.240.15,NAT Destination IP: 185.184.10.30,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 73455158,Repeat Count: 1,Source Port: 64964,Destination Port: 443,NAT Source Port: 1291,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: business-and-economy,Sequence Number: 7253419068419885138,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 4 16:06:14 panmgt01p 1,2023/10/04 16:06:14,012501002341,THREAT,url,2561,2023/10/04 16:06:14,10.36.120.165,13.70.123.149,134.7.247.37,13.70.123.149,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 16:06:14,35461899,1,46232,443,19326,443,0x40f400,tcp,alert,commcentre.curtin.edu.au/,9999(9999),educational-institutions,informational,client-to-server,7253419068416073079,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,, allow-curtin-edu-au-only educational-institutions low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T16:06:14.345+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
FUTURE_USE: Oct 4 16:06:14 panmgt01p 1,Receive Time: 2023/10/04 16:06:14,Type: THREAT,Threat/Content Type: url,Source Address: 10.36.120.165,Destination Address: 13.70.123.149,NAT Source IP: 134.7.247.37,NAT Destination IP: 13.70.123.149,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 35461899,Repeat Count: 1,Source Port: 46232,Destination Port: 443,NAT Source Port: 19326,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: educational-institutions,Sequence Number: 7253419068416073079,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 6 11:43:35 panmgt01p 1,2023/10/06 11:43:35,012501002341,THREAT,file,2561,2023/10/06 11:43:34,10.130.160.92,152.195.38.76,134.7.244.92,152.195.38.76,Curtin-CS-Research-Out,student\XXXXXXXX,,ocsp,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/06 11:43:34,10086900,3,65176,80,48424,80,0x406000,tcp,alert,6+rkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0=,DER Encoded X509 Certificate(52209),computer-and-internet-info,low,server-to-client,7253419068653771667,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,1,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-8761-8325,0x0,0,4294967295,,,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-06T11:43:34.721+08:00,,,,infrastructure,networking,client-server,2,has-known-vulnerability pervasive-use,,ocsp,no,no,
FUTURE_USE: Oct 6 11:43:35 panmgt01p 1,Receive Time: 2023/10/06 11:43:35,Type: THREAT,Threat/Content Type: file,Source Address: 10.130.160.92,Destination Address: 152.195.38.76,NAT Source IP: 134.7.244.92,NAT Destination IP: 152.195.38.76,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ocsp,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 10086900,Repeat Count: 3,Source Port: 65176,Destination Port: 80,NAT Source Port: 48424,NAT Destination Port: 80,Flags: 0x406000,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068653771667,Application Subcategory: infrastructure,Application Category: networking,Application Risk: 2,Application Characteristic: has-known-vulnerability pervasive-use,Tunneled Application: ocsp
Print each key and value for the log
Oct 6 12:02:09 panmgt01p 1,2023/10/06 12:02:09,012501002341,TRAFFIC,end,2561,2023/10/06 12:02:08,10.130.146.168,52.123.128.14,134.7.244.168,52.123.128.14,Curtin-CS-Research-Out,student\XXXXXXXX,,ms-teams,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/06 12:02:08,67247200,1,63612,443,33475,443,0x40447a,tcp,allow,24154,15608,8546,47,2023/10/06 11:59:23,166,computer-and-internet-info,,7253419120985563026,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,25,22,tcp-rst-from-server,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-06T12:02:09.578+08:00,,,office-programs,saas,client-server,3,able-to-transfer-file has-known-vulnerability pervasive-use is-saas is-fedramp is-hipaa is-pci is-ssae16 is-ip-based-restrictions,ms-office365,ms-teams,yes,no,0
FUTURE_USE: Oct 6 12:02:09 panmgt01p 1,Receive Time: 2023/10/06 12:02:09,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.146.168,Destination Address: 52.123.128.14,NAT Source IP: 134.7.244.168,NAT Destination IP: 52.123.128.14,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ms-teams,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 67247200,Repeat Count: 1,Source Port: 63612,Destination Port: 443,NAT Source Port: 33475,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 24154,Bytes Sent: 15608,Bytes Received: 8546,Packets: 47,Start Time: 2023/10/06 11:59:23,Elapsed Time: 166,Category: computer-and-internet-info,Sequence Number: 7253419120985563026,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 25,Packets Received: 22,Session End Reason: tcp-rst-from-server,Application Subcategory: office-programs,Application Category: saas,Application Risk: 3,Application Characteristic: able-to-transfer-file has-known-vulnerability pervasive-use is-saas is-fedramp is-hipaa is-pci is-ssae16 is-ip-based-restrictions,Tunneled Application: ms-teams
Print each key and value for the log
Oct 6 12:09:38 panmgt01p 1,2023/10/06 12:09:38,012501002341,TRAFFIC,end,2561,2023/10/06 12:09:37,10.130.160.36,192.229.237.25,134.7.244.36,192.229.237.25,Curtin-CS-Research-Out,student\XXXXXXXX,,twitter-base,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/06 12:09:37,8629790,1,55817,443,1176,443,0x40447a,tcp,allow,9190,2703,6487,37,2023/10/06 12:06:16,201,social-networking,,7253419120992345404,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,18,19,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-06T12:09:37.880+08:00,,,social-networking,collaboration,browser-based,3,used-by-malware able-to-transfer-file pervasive-use,twitter,twitter-base,no,no,0
FUTURE_USE: Oct 6 12:09:38 panmgt01p 1,Receive Time: 2023/10/06 12:09:38,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.160.36,Destination Address: 192.229.237.25,NAT Source IP: 134.7.244.36,NAT Destination IP: 192.229.237.25,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: twitter-base,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 8629790,Repeat Count: 1,Source Port: 55817,Destination Port: 443,NAT Source Port: 1176,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 9190,Bytes Sent: 2703,Bytes Received: 6487,Packets: 37,Start Time: 2023/10/06 12:06:16,Elapsed Time: 201,Category: social-networking,Sequence Number: 7253419120992345404,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 18,Packets Received: 19,Session End Reason: tcp-rst-from-client,Application Subcategory: social-networking,Application Category: collaboration,Application Risk: 3,Application Characteristic: used-by-malware able-to-transfer-file pervasive-use,Tunneled Application: twitter-base
Print each key and value for the log
Oct 6 08:07:37 panmgt01p 1,2023/10/06 08:07:36,012501002341,THREAT,url,2561,2023/10/06 08:07:33,10.130.180.75,23.210.81.227,134.7.244.75,23.210.81.227,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/06 08:07:33,69285557,1,54440,443,35487,443,0x40f400,tcp,alert,disc501.prod.do.dsp.mp.microsoft.com/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068626226645,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-06T08:07:33.951+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
FUTURE_USE: Oct 6 08:07:37 panmgt01p 1,Receive Time: 2023/10/06 08:07:36,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.180.75,Destination Address: 23.210.81.227,NAT Source IP: 134.7.244.75,NAT Destination IP: 23.210.81.227,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 69285557,Repeat Count: 1,Source Port: 54440,Destination Port: 443,NAT Source Port: 35487,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068626226645,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 5 15:23:28 panmgt01p 1,2023/10/05 15:23:27,012501002341,TRAFFIC,end,2561,2023/10/05 15:23:28,10.130.183.243,157.240.8.23,134.7.244.243,157.240.8.23,Curtin-CS-Research-Out,student\XXXXXXXX,,facebook-base,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/05 15:23:28,39185025,1,60236,443,18748,443,0x40447a,tcp,allow,237784,6569,231215,283,2023/10/05 15:21:54,91,social-networking,,7253419120338304946,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,90,193,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-05T15:23:28.511+08:00,,,social-networking,saas,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use is-saas no-certifications,facebook,facebook-base,yes,no,0
FUTURE_USE: Oct 5 15:23:28 panmgt01p 1,Receive Time: 2023/10/05 15:23:27,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.183.243,Destination Address: 157.240.8.23,NAT Source IP: 134.7.244.243,NAT Destination IP: 157.240.8.23,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: facebook-base,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 39185025,Repeat Count: 1,Source Port: 60236,Destination Port: 443,NAT Source Port: 18748,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 237784,Bytes Sent: 6569,Bytes Received: 231215,Packets: 283,Start Time: 2023/10/05 15:21:54,Elapsed Time: 91,Category: social-networking,Sequence Number: 7253419120338304946,Source Country: 10.0.0.0-10.255.255.255,Destination Country: Australia,Packets Sent: 90,Packets Received: 193,Session End Reason: tcp-fin,Application Subcategory: social-networking,Application Category: saas,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use is-saas no-certifications,Tunneled Application: facebook-base
Print each key and value for the log
Oct 6 11:05:35 panmgt01p 1,2023/10/06 11:05:34,012501002341,TRAFFIC,end,2561,2023/10/06 11:05:34,10.130.150.175,104.22.37.229,134.7.244.175,104.22.37.229,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/06 11:05:34,2498402,1,60406,443,1148,443,0x40447a,tcp,allow,9458,3825,5633,43,2023/10/06 11:01:26,248,educational-institutions,,7253419120935397616,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,20,23,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-06T11:05:34.845+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
FUTURE_USE: Oct 6 11:05:35 panmgt01p 1,Receive Time: 2023/10/06 11:05:34,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.150.175,Destination Address: 104.22.37.229,NAT Source IP: 134.7.244.175,NAT Destination IP: 104.22.37.229,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 2498402,Repeat Count: 1,Source Port: 60406,Destination Port: 443,NAT Source Port: 1148,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 9458,Bytes Sent: 3825,Bytes Received: 5633,Packets: 43,Start Time: 2023/10/06 11:01:26,Elapsed Time: 248,Category: educational-institutions,Sequence Number: 7253419120935397616,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 20,Packets Received: 23,Session End Reason: tcp-fin,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 1 13:59:28 panmgt01p 1,2023/10/01 13:59:28,012501002341,THREAT,url,2561,2023/10/01 13:59:25,10.130.142.55,104.19.159.19,134.7.244.55,104.19.159.19,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/01 13:59:25,72198303,1,45770,443,13948,443,0x40f400,tcp,alert,c3.a-mo.net/,9999(9999),content-delivery-networks,informational,client-to-server,7253419067991569770,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,content-delivery-networks low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-01T13:59:25.370+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
FUTURE_USE: Oct 1 13:59:28 panmgt01p 1,Receive Time: 2023/10/01 13:59:28,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.142.55,Destination Address: 104.19.159.19,NAT Source IP: 134.7.244.55,NAT Destination IP: 104.19.159.19,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 72198303,Repeat Count: 1,Source Port: 45770,Destination Port: 443,NAT Source Port: 13948,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: content-delivery-networks,Sequence Number: 7253419067991569770,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 7 22:00:09 panmgt01p 1,2023/10/07 22:00:09,012501002341,TRAFFIC,end,2561,2023/10/07 22:00:08,10.130.162.130,119.63.197.139,134.7.244.130,119.63.197.139,Curtin-CS-Research-Out,student\XXXXXXXX,,incomplete,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/07 22:00:08,36601034,1,58374,80,2327,80,0x40401a,tcp,allow,620,550,70,10,2023/10/07 21:58:59,54,any,,7253419121907442794,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,9,1,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-07T22:00:08.854+08:00,,,unknown,unknown,unknown,1,,,incomplete,no,no,0
FUTURE_USE: Oct 7 22:00:09 panmgt01p 1,Receive Time: 2023/10/07 22:00:09,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.162.130,Destination Address: 119.63.197.139,NAT Source IP: 134.7.244.130,NAT Destination IP: 119.63.197.139,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: incomplete,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 36601034,Repeat Count: 1,Source Port: 58374,Destination Port: 80,NAT Source Port: 2327,NAT Destination Port: 80,Flags: 0x40401a,Protocol: tcp,Action: allow,Bytes: 620,Bytes Sent: 550,Bytes Received: 70,Packets: 10,Start Time: 2023/10/07 21:58:59,Elapsed Time: 54,Category: any,Sequence Number: 7253419121907442794,Source Country: 10.0.0.0-10.255.255.255,Destination Country: Japan,Packets Sent: 9,Packets Received: 1,Session End Reason: tcp-rst-from-client,Application Subcategory: unknown,Application Category: unknown,Application Risk: 1,Tunneled Application: incomplete
Print each key and value for the log
Oct 1 16:39:19 panmgt01p 1,2023/10/01 16:39:19,012501002341,TRAFFIC,end,2561,2023/10/01 16:39:18,10.130.174.130,13.107.42.16,134.7.244.130,13.107.42.16,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/01 16:39:18,44176544,1,43342,443,28191,443,0x40441c,tcp,allow,16923,1914,15009,35,2023/10/01 16:39:04,0,internet-communications-and-telephony,,7253419117013456100,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,16,19,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-01T16:39:19.024+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
FUTURE_USE: Oct 1 16:39:19 panmgt01p 1,Receive Time: 2023/10/01 16:39:19,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.174.130,Destination Address: 13.107.42.16,NAT Source IP: 134.7.244.130,NAT Destination IP: 13.107.42.16,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 44176544,Repeat Count: 1,Source Port: 43342,Destination Port: 443,NAT Source Port: 28191,NAT Destination Port: 443,Flags: 0x40441c,Protocol: tcp,Action: allow,Bytes: 16923,Bytes Sent: 1914,Bytes Received: 15009,Packets: 35,Start Time: 2023/10/01 16:39:04,Elapsed Time: 0,Category: internet-communications-and-telephony,Sequence Number: 7253419117013456100,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 16,Packets Received: 19,Session End Reason: tcp-fin,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 1 11:16:42 panmgt01p 1,2023/10/01 11:16:42,012501002341,THREAT,url,2561,2023/10/01 11:16:38,10.130.222.9,184.84.148.222,134.7.244.9,184.84.148.222,Curtin-CS-Research-Out,student\XXXXXXXX,,itunes-base,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/01 11:16:38,68868215,1,57388,443,35391,443,0x40f400,tcp,alert,bag.itunes.apple.com/,9999(9999),music,informational,client-to-server,7253419067979405541,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,music low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-01T11:16:38.800+08:00,,,,audio-streaming,media,client-server,3,evasive-behavior has-known-vulnerability pervasive-use,itunes,itunes-base,no,no,
FUTURE_USE: Oct 1 11:16:42 panmgt01p 1,Receive Time: 2023/10/01 11:16:42,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.222.9,Destination Address: 184.84.148.222,NAT Source IP: 134.7.244.9,NAT Destination IP: 184.84.148.222,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: itunes-base,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 68868215,Repeat Count: 1,Source Port: 57388,Destination Port: 443,NAT Source Port: 35391,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: music,Sequence Number: 7253419067979405541,Application Subcategory: audio-streaming,Application Category: media,Application Risk: 3,Application Characteristic: evasive-behavior has-known-vulnerability pervasive-use,Tunneled Application: itunes-base
Print each key and value for the log
Oct 7 22:09:47 panmgt01p 1,2023/10/07 22:09:46,012501002341,TRAFFIC,end,2561,2023/10/07 22:09:45,10.130.175.124,35.161.3.70,134.7.244.124,35.161.3.70,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/07 22:09:45,876830,1,62813,443,13414,443,0x40447a,tcp,allow,11478,4009,7469,30,2023/10/07 22:09:28,16,computer-and-internet-info,,7253419121911235393,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,15,15,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-07T22:09:45.552+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
FUTURE_USE: Oct 7 22:09:47 panmgt01p 1,Receive Time: 2023/10/07 22:09:46,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.175.124,Destination Address: 35.161.3.70,NAT Source IP: 134.7.244.124,NAT Destination IP: 35.161.3.70,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 876830,Repeat Count: 1,Source Port: 62813,Destination Port: 443,NAT Source Port: 13414,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 11478,Bytes Sent: 4009,Bytes Received: 7469,Packets: 30,Start Time: 2023/10/07 22:09:28,Elapsed Time: 16,Category: computer-and-internet-info,Sequence Number: 7253419121911235393,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 15,Packets Received: 15,Session End Reason: tcp-fin,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 5 09:09:43 panmgt01p 1,2023/10/05 09:09:43,012501002341,TRAFFIC,end,2561,2023/10/05 09:09:42,10.130.140.151,152.195.38.76,134.7.244.151,152.195.38.76,Curtin-CS-Research-Out,student\XXXXXXXX,,ocsp,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/05 09:09:42,68341586,1,53481,80,21943,80,0x40401c,tcp,allow,1937,843,1094,12,2023/10/05 09:08:55,30,computer-and-internet-info,,7253419119990447501,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,7,5,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-05T09:09:42.977+08:00,,,infrastructure,networking,client-server,2,has-known-vulnerability pervasive-use,,ocsp,no,no,0
FUTURE_USE: Oct 5 09:09:43 panmgt01p 1,Receive Time: 2023/10/05 09:09:43,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.140.151,Destination Address: 152.195.38.76,NAT Source IP: 134.7.244.151,NAT Destination IP: 152.195.38.76,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ocsp,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 68341586,Repeat Count: 1,Source Port: 53481,Destination Port: 80,NAT Source Port: 21943,NAT Destination Port: 80,Flags: 0x40401c,Protocol: tcp,Action: allow,Bytes: 1937,Bytes Sent: 843,Bytes Received: 1094,Packets: 12,Start Time: 2023/10/05 09:08:55,Elapsed Time: 30,Category: computer-and-internet-info,Sequence Number: 7253419119990447501,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 7,Packets Received: 5,Session End Reason: tcp-fin,Application Subcategory: infrastructure,Application Category: networking,Application Risk: 2,Application Characteristic: has-known-vulnerability pervasive-use,Tunneled Application: ocsp
Print each key and value for the log
Oct 5 17:50:39 panmgt01p 1,2023/10/05 17:50:38,012501002341,THREAT,url,2561,2023/10/05 17:50:38,10.130.135.170,104.81.249.30,134.7.244.170,104.81.249.30,Curtin-CS-Research-Out,student\XXXXXXXX,,google-base,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/05 17:50:38,6527475,1,51168,80,41928,80,0x40f000,tcp,alert,proxy-safebrowsing.googleapis.com:443/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068568090793,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,,0,,,1,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,connect,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-05T17:50:38.881+08:00,,,,internet-utility,general-internet,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,google-base,no,no,
FUTURE_USE: Oct 5 17:50:39 panmgt01p 1,Receive Time: 2023/10/05 17:50:38,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.135.170,Destination Address: 104.81.249.30,NAT Source IP: 134.7.244.170,NAT Destination IP: 104.81.249.30,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: google-base,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 6527475,Repeat Count: 1,Source Port: 51168,Destination Port: 80,NAT Source Port: 41928,NAT Destination Port: 80,Flags: 0x40f000,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068568090793,Application Subcategory: internet-utility,Application Category: general-internet,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: google-base
Print each key and value for the log
Oct 4 16:28:46 panmgt01p 1,2023/10/04 16:28:46,012501002341,THREAT,url,2561,2023/10/04 16:28:43,10.130.150.223,184.84.148.222,134.7.244.223,184.84.148.222,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 16:28:43,39742618,1,58534,443,25784,443,0x40f400,tcp,alert,amp-api-edge.apps.apple.com/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068418967011,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T16:28:43.432+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
FUTURE_USE: Oct 4 16:28:46 panmgt01p 1,Receive Time: 2023/10/04 16:28:46,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.150.223,Destination Address: 184.84.148.222,NAT Source IP: 134.7.244.223,NAT Destination IP: 184.84.148.222,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 39742618,Repeat Count: 1,Source Port: 58534,Destination Port: 443,NAT Source Port: 25784,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068418967011,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 3 14:07:12 panmgt01p 1,2023/10/03 14:07:11,012501002341,TRAFFIC,end,2561,2023/10/03 14:07:11,10.130.184.110,141.94.171.213,134.7.244.110,141.94.171.213,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/03 14:07:11,69805336,1,62659,443,44146,443,0x40441a,tcp,allow,7146,1049,6097,15,2023/10/03 14:06:40,0,business-and-economy,,7253419118551583602,0x8000000000000000,10.0.0.0-10.255.255.255,France,,8,7,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-03T14:07:11.823+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
FUTURE_USE: Oct 3 14:07:12 panmgt01p 1,Receive Time: 2023/10/03 14:07:11,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.184.110,Destination Address: 141.94.171.213,NAT Source IP: 134.7.244.110,NAT Destination IP: 141.94.171.213,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 69805336,Repeat Count: 1,Source Port: 62659,Destination Port: 443,NAT Source Port: 44146,NAT Destination Port: 443,Flags: 0x40441a,Protocol: tcp,Action: allow,Bytes: 7146,Bytes Sent: 1049,Bytes Received: 6097,Packets: 15,Start Time: 2023/10/03 14:06:40,Elapsed Time: 0,Category: business-and-economy,Sequence Number: 7253419118551583602,Source Country: 10.0.0.0-10.255.255.255,Destination Country: France,Packets Sent: 8,Packets Received: 7,Session End Reason: tcp-rst-from-client,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 5 14:04:15 panmgt01p 1,2023/10/05 14:04:15,012501002341,TRAFFIC,end,2561,2023/10/05 14:04:15,10.130.153.28,13.107.42.16,134.7.244.28,13.107.42.16,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/05 14:04:15,36839388,1,55044,443,37671,443,0x40447a,tcp,allow,10857,2370,8487,35,2023/10/05 14:01:40,152,internet-communications-and-telephony,,7253419120263880438,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,15,20,tcp-rst-from-server,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-05T14:04:15.454+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
FUTURE_USE: Oct 5 14:04:15 panmgt01p 1,Receive Time: 2023/10/05 14:04:15,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.153.28,Destination Address: 13.107.42.16,NAT Source IP: 134.7.244.28,NAT Destination IP: 13.107.42.16,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 36839388,Repeat Count: 1,Source Port: 55044,Destination Port: 443,NAT Source Port: 37671,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 10857,Bytes Sent: 2370,Bytes Received: 8487,Packets: 35,Start Time: 2023/10/05 14:01:40,Elapsed Time: 152,Category: internet-communications-and-telephony,Sequence Number: 7253419120263880438,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 15,Packets Received: 20,Session End Reason: tcp-rst-from-server,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 5 22:08:55 panmgt01p 1,2023/10/05 22:08:55,012501002341,THREAT,url,2561,2023/10/05 22:08:51,134.7.56.153,51.104.15.253,0.0.0.0,0.0.0.0,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/05 22:08:51,41924738,1,60750,443,0,0,0xf400,tcp,alert,uk-v20.events.data.microsoft.com/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068588614802,0x8000000000000000,Australia,United Kingdom,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-05T22:08:51.806+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
FUTURE_USE: Oct 5 22:08:55 panmgt01p 1,Receive Time: 2023/10/05 22:08:55,Type: THREAT,Threat/Content Type: url,Source Address: 134.7.56.153,Destination Address: 51.104.15.253,NAT Source IP: 0.0.0.0,NAT Destination IP: 0.0.0.0,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 41924738,Repeat Count: 1,Source Port: 60750,Destination Port: 443,NAT Source Port: 0,NAT Destination Port: 0,Flags: 0xf400,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068588614802,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 5 19:48:33 panmgt01p 1,2023/10/05 19:48:33,012501002341,THREAT,url,2561,2023/10/05 19:48:29,10.130.132.102,17.253.67.207,134.7.244.102,17.253.67.207,Curtin-CS-Research-Out,student\XXXXXXXX,,apple-maps,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/05 19:48:29,5467873,1,64739,443,33025,443,0x40f400,tcp,alert,gsp-ssl.ls.apple.com/,9999(9999),reference-and-research,informational,client-to-server,7253419068577899345,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,reference-and-research low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-05T19:48:29.305+08:00,,,,internet-utility,general-internet,client-server,1,consume-big-bandwidth pervasive-use,,apple-maps,no,no,
FUTURE_USE: Oct 5 19:48:33 panmgt01p 1,Receive Time: 2023/10/05 19:48:33,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.132.102,Destination Address: 17.253.67.207,NAT Source IP: 134.7.244.102,NAT Destination IP: 17.253.67.207,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: apple-maps,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 5467873,Repeat Count: 1,Source Port: 64739,Destination Port: 443,NAT Source Port: 33025,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: reference-and-research,Sequence Number: 7253419068577899345,Application Subcategory: internet-utility,Application Category: general-internet,Application Risk: 1,Application Characteristic: consume-big-bandwidth pervasive-use,Tunneled Application: apple-maps
Print each key and value for the log
Oct 6 13:03:55 panmgt01p 1,2023/10/06 13:03:54,012501002341,TRAFFIC,end,2561,2023/10/06 13:03:54,10.130.151.207,172.217.24.46,134.7.244.207,172.217.24.46,Curtin-CS-Research-Out,student\XXXXXXXX,,incomplete,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/06 13:03:54,43504836,1,50565,443,5208,443,0x40401a,tcp,allow,376,142,234,5,2023/10/06 13:03:50,3,any,,7253419121039060547,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,2,3,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-06T13:03:54.849+08:00,,,unknown,unknown,unknown,1,,,incomplete,no,no,0
FUTURE_USE: Oct 6 13:03:55 panmgt01p 1,Receive Time: 2023/10/06 13:03:54,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.151.207,Destination Address: 172.217.24.46,NAT Source IP: 134.7.244.207,NAT Destination IP: 172.217.24.46,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: incomplete,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 43504836,Repeat Count: 1,Source Port: 50565,Destination Port: 443,NAT Source Port: 5208,NAT Destination Port: 443,Flags: 0x40401a,Protocol: tcp,Action: allow,Bytes: 376,Bytes Sent: 142,Bytes Received: 234,Packets: 5,Start Time: 2023/10/06 13:03:50,Elapsed Time: 3,Category: any,Sequence Number: 7253419121039060547,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 2,Packets Received: 3,Session End Reason: tcp-rst-from-client,Application Subcategory: unknown,Application Category: unknown,Application Risk: 1,Tunneled Application: incomplete
Print each key and value for the log
Oct 5 18:04:46 panmgt01p 1,2023/10/05 18:04:45,012501002341,THREAT,url,2561,2023/10/05 18:04:43,10.130.132.79,3.23.212.142,134.7.244.79,3.23.212.142,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/05 18:04:43,4604595,1,63349,443,11921,443,0x40f400,tcp,alert,api.webparanoid.com/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068569364853,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-05T18:04:43.935+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
FUTURE_USE: Oct 5 18:04:46 panmgt01p 1,Receive Time: 2023/10/05 18:04:45,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.132.79,Destination Address: 3.23.212.142,NAT Source IP: 134.7.244.79,NAT Destination IP: 3.23.212.142,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 4604595,Repeat Count: 1,Source Port: 63349,Destination Port: 443,NAT Source Port: 11921,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068569364853,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 4 13:52:37 panmgt01p 1,2023/10/04 13:52:36,012501002341,THREAT,url,2561,2023/10/04 13:52:36,10.130.156.93,172.217.24.42,134.7.244.93,172.217.24.42,Curtin-CS-Research-Out,student\XXXXXXXX,,google-base,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 13:52:36,75750086,1,60344,443,19544,443,0x40f400,tcp,alert,oauthaccountmanager.googleapis.com/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068396851620,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-04T13:52:36.866+08:00,,,,internet-utility,general-internet,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,google-base,no,no,
FUTURE_USE: Oct 4 13:52:37 panmgt01p 1,Receive Time: 2023/10/04 13:52:36,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.156.93,Destination Address: 172.217.24.42,NAT Source IP: 134.7.244.93,NAT Destination IP: 172.217.24.42,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: google-base,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 75750086,Repeat Count: 1,Source Port: 60344,Destination Port: 443,NAT Source Port: 19544,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068396851620,Application Subcategory: internet-utility,Application Category: general-internet,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: google-base
Print each key and value for the log
Oct 4 19:19:02 panmgt01p 1,2023/10/04 19:19:02,012501002341,TRAFFIC,end,2561,2023/10/04 19:19:01,10.130.185.129,3.104.112.234,134.7.244.129,3.104.112.234,Curtin-CS-Research-Out,student\XXXXXXXX,,incomplete,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 19:19:01,77783661,1,52559,443,21872,443,0x404019,tcp,allow,280,70,210,4,2023/10/04 19:18:54,3,any,,7253419119640920047,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,1,3,unknown,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T19:19:01.548+08:00,,,unknown,unknown,unknown,1,,,incomplete,no,no,0
FUTURE_USE: Oct 4 19:19:02 panmgt01p 1,Receive Time: 2023/10/04 19:19:02,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.185.129,Destination Address: 3.104.112.234,NAT Source IP: 134.7.244.129,NAT Destination IP: 3.104.112.234,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: incomplete,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 77783661,Repeat Count: 1,Source Port: 52559,Destination Port: 443,NAT Source Port: 21872,NAT Destination Port: 443,Flags: 0x404019,Protocol: tcp,Action: allow,Bytes: 280,Bytes Sent: 70,Bytes Received: 210,Packets: 4,Start Time: 2023/10/04 19:18:54,Elapsed Time: 3,Category: any,Sequence Number: 7253419119640920047,Source Country: 10.0.0.0-10.255.255.255,Destination Country: Australia,Packets Sent: 1,Packets Received: 3,Session End Reason: unknown,Application Subcategory: unknown,Application Category: unknown,Application Risk: 1,Tunneled Application: incomplete
Print each key and value for the log
Oct 5 03:08:16 panmgt01p 1,2023/10/05 03:08:16,012501002341,TRAFFIC,end,2561,2023/10/05 03:08:14,10.130.150.97,172.217.24.42,134.7.244.97,172.217.24.42,Curtin-CS-Research-Out,student\XXXXXXXX,,google-base,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/05 03:08:14,38389670,1,61114,443,33177,443,0x40447a,tcp,allow,4821,2315,2506,31,2023/10/05 03:07:56,16,computer-and-internet-info,,7253419119846520794,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,14,17,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-05T03:08:15.168+08:00,,,internet-utility,general-internet,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,google-base,no,no,0
FUTURE_USE: Oct 5 03:08:16 panmgt01p 1,Receive Time: 2023/10/05 03:08:16,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.150.97,Destination Address: 172.217.24.42,NAT Source IP: 134.7.244.97,NAT Destination IP: 172.217.24.42,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: google-base,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 38389670,Repeat Count: 1,Source Port: 61114,Destination Port: 443,NAT Source Port: 33177,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 4821,Bytes Sent: 2315,Bytes Received: 2506,Packets: 31,Start Time: 2023/10/05 03:07:56,Elapsed Time: 16,Category: computer-and-internet-info,Sequence Number: 7253419119846520794,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 14,Packets Received: 17,Session End Reason: tcp-fin,Application Subcategory: internet-utility,Application Category: general-internet,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: google-base
Print each key and value for the log
Oct 5 15:29:23 panmgt01p 1,2023/10/05 15:29:23,012501002341,THREAT,url,2561,2023/10/05 15:29:22,10.130.130.192,69.173.158.65,134.7.244.192,69.173.158.65,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/05 15:29:22,74382483,1,59031,443,1938,443,0x40f400,tcp,alert,fastlane.rubiconproject.com/,9999(9999),business-and-economy,informational,client-to-server,7253419068551405428,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,business-and-economy low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-05T15:29:23.320+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
FUTURE_USE: Oct 5 15:29:23 panmgt01p 1,Receive Time: 2023/10/05 15:29:23,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.130.192,Destination Address: 69.173.158.65,NAT Source IP: 134.7.244.192,NAT Destination IP: 69.173.158.65,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 74382483,Repeat Count: 1,Source Port: 59031,Destination Port: 443,NAT Source Port: 1938,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: business-and-economy,Sequence Number: 7253419068551405428,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 4 05:18:04 panmgt01p 1,2023/10/04 05:18:03,012501002341,TRAFFIC,end,2561,2023/10/04 05:18:03,10.130.166.147,13.78.111.198,134.7.244.147,13.78.111.198,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 05:18:03,7481880,1,57236,443,10748,443,0x40447a,tcp,allow,8753,3056,5697,26,2023/10/04 05:17:45,15,computer-and-internet-info,,7253419119032270169,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,14,12,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T05:18:03.263+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
FUTURE_USE: Oct 4 05:18:04 panmgt01p 1,Receive Time: 2023/10/04 05:18:03,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.166.147,Destination Address: 13.78.111.198,NAT Source IP: 134.7.244.147,NAT Destination IP: 13.78.111.198,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 7481880,Repeat Count: 1,Source Port: 57236,Destination Port: 443,NAT Source Port: 10748,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 8753,Bytes Sent: 3056,Bytes Received: 5697,Packets: 26,Start Time: 2023/10/04 05:17:45,Elapsed Time: 15,Category: computer-and-internet-info,Sequence Number: 7253419119032270169,Source Country: 10.0.0.0-10.255.255.255,Destination Country: Japan,Packets Sent: 14,Packets Received: 12,Session End Reason: tcp-fin,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 5 16:26:51 panmgt01p 1,2023/10/05 16:26:51,012501002341,THREAT,url,2561,2023/10/05 16:26:49,10.130.139.173,40.99.133.242,134.7.244.173,40.99.133.242,Curtin-CS-Research-Out,student\XXXXXXXX,,hotmail,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/05 16:26:49,39890627,1,61357,443,53237,443,0x40f400,tcp,alert,m.hotmail.com/,9999(9999),web-based-email,informational,client-to-server,7253419068559079555,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,web-based-email low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-05T16:26:49.584+08:00,,,,email,collaboration,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability pervasive-use,,hotmail,no,no,
FUTURE_USE: Oct 5 16:26:51 panmgt01p 1,Receive Time: 2023/10/05 16:26:51,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.139.173,Destination Address: 40.99.133.242,NAT Source IP: 134.7.244.173,NAT Destination IP: 40.99.133.242,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: hotmail,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 39890627,Repeat Count: 1,Source Port: 61357,Destination Port: 443,NAT Source Port: 53237,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: web-based-email,Sequence Number: 7253419068559079555,Application Subcategory: email,Application Category: collaboration,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability pervasive-use,Tunneled Application: hotmail
Print each key and value for the log
Oct 6 12:14:15 panmgt01p 1,2023/10/06 12:14:15,012501002341,TRAFFIC,end,2561,2023/10/06 12:14:14,10.130.140.71,35.71.131.137,134.7.244.71,35.71.131.137,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/06 12:14:14,74333373,1,51507,443,30106,443,0x40447a,tcp,allow,5836,3072,2764,26,2023/10/06 12:13:51,24,web-advertisements,,7253419120996432960,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,12,14,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-06T12:14:14.956+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
FUTURE_USE: Oct 6 12:14:15 panmgt01p 1,Receive Time: 2023/10/06 12:14:15,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.140.71,Destination Address: 35.71.131.137,NAT Source IP: 134.7.244.71,NAT Destination IP: 35.71.131.137,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 74333373,Repeat Count: 1,Source Port: 51507,Destination Port: 443,NAT Source Port: 30106,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 5836,Bytes Sent: 3072,Bytes Received: 2764,Packets: 26,Start Time: 2023/10/06 12:13:51,Elapsed Time: 24,Category: web-advertisements,Sequence Number: 7253419120996432960,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 12,Packets Received: 14,Session End Reason: tcp-fin,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 3 15:48:15 panmgt01p 1,2023/10/03 15:48:14,012501002341,THREAT,url,2561,2023/10/03 15:48:14,10.130.184.78,35.219.111.231,134.7.244.78,35.219.111.231,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/03 15:48:14,35634089,1,61968,443,53743,443,0x40f400,tcp,alert,e2c37.gcp.gvt2.com/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068275972642,0x8000000000000000,10.0.0.0-10.255.255.255,Indonesia,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-03T15:48:14.065+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
FUTURE_USE: Oct 3 15:48:15 panmgt01p 1,Receive Time: 2023/10/03 15:48:14,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.184.78,Destination Address: 35.219.111.231,NAT Source IP: 134.7.244.78,NAT Destination IP: 35.219.111.231,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 35634089,Repeat Count: 1,Source Port: 61968,Destination Port: 443,NAT Source Port: 53743,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068275972642,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 7 04:35:30 panmgt01p 1,2023/10/07 04:35:29,012501002341,THREAT,url,2561,2023/10/07 04:35:29,10.128.54.151,51.132.193.104,134.7.240.151,51.132.193.104,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/07 04:35:29,40216618,1,52919,443,48405,443,0x40f400,tcp,alert,uk-v20.events.data.microsoft.com/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068740144780,0x8000000000000000,10.0.0.0-10.255.255.255,United Kingdom,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-07T04:35:29.349+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
FUTURE_USE: Oct 7 04:35:30 panmgt01p 1,Receive Time: 2023/10/07 04:35:29,Type: THREAT,Threat/Content Type: url,Source Address: 10.128.54.151,Destination Address: 51.132.193.104,NAT Source IP: 134.7.240.151,NAT Destination IP: 51.132.193.104,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 40216618,Repeat Count: 1,Source Port: 52919,Destination Port: 443,NAT Source Port: 48405,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068740144780,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 6 05:45:03 panmgt01p 1,2023/10/06 05:45:03,012501002341,TRAFFIC,end,2561,2023/10/06 05:45:01,10.130.172.197,44.238.89.130,134.7.244.197,44.238.89.130,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/06 05:45:01,880181,1,63052,443,54190,443,0x40447a,tcp,allow,11640,3939,7701,30,2023/10/06 05:44:46,16,computer-and-internet-info,,7253419120746632059,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,14,16,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-06T05:45:02.386+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
FUTURE_USE: Oct 6 05:45:03 panmgt01p 1,Receive Time: 2023/10/06 05:45:03,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.172.197,Destination Address: 44.238.89.130,NAT Source IP: 134.7.244.197,NAT Destination IP: 44.238.89.130,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 880181,Repeat Count: 1,Source Port: 63052,Destination Port: 443,NAT Source Port: 54190,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 11640,Bytes Sent: 3939,Bytes Received: 7701,Packets: 30,Start Time: 2023/10/06 05:44:46,Elapsed Time: 16,Category: computer-and-internet-info,Sequence Number: 7253419120746632059,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 14,Packets Received: 16,Session End Reason: tcp-fin,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 6 13:36:16 panmgt01p 1,2023/10/06 13:36:16,012501002341,TRAFFIC,end,2561,2023/10/06 13:36:15,134.7.214.25,20.150.86.132,0.0.0.0,0.0.0.0,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/06 13:36:15,67708152,1,61914,443,0,0,0x447a,tcp,allow,18658,3874,14784,53,2023/10/06 13:34:05,131,computer-and-internet-info,,7253419121066867662,0x8000000000000000,Australia,Asia Pacific Region,,25,28,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-06T13:36:16.041+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
FUTURE_USE: Oct 6 13:36:16 panmgt01p 1,Receive Time: 2023/10/06 13:36:16,Type: TRAFFIC,Threat/Content Type: end,Source Address: 134.7.214.25,Destination Address: 20.150.86.132,NAT Source IP: 0.0.0.0,NAT Destination IP: 0.0.0.0,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 67708152,Repeat Count: 1,Source Port: 61914,Destination Port: 443,NAT Source Port: 0,NAT Destination Port: 0,Flags: 0x447a,Protocol: tcp,Action: allow,Bytes: 18658,Bytes Sent: 3874,Bytes Received: 14784,Packets: 53,Start Time: 2023/10/06 13:34:05,Elapsed Time: 131,Category: computer-and-internet-info,Sequence Number: 7253419121066867662,Source Country: Australia,Destination Country: Asia Pacific Region,Packets Sent: 25,Packets Received: 28,Session End Reason: tcp-fin,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 8 07:43:52 panmgt01p 1,2023/10/08 07:43:52,012501002341,TRAFFIC,end,2561,2023/10/08 07:43:50,10.130.147.10,157.240.8.1,134.7.244.10,157.240.8.1,Curtin-CS-Research-Out,student\XXXXXXXX,,facebook-base,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/08 07:43:50,73623135,1,57114,443,37156,443,0x40447a,tcp,allow,41096,31226,9870,168,2023/10/08 07:42:00,110,social-networking,,7253419122095717450,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,86,82,tcp-rst-from-server,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-08T07:43:51.324+08:00,,,social-networking,saas,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use is-saas no-certifications,facebook,facebook-base,yes,no,0
FUTURE_USE: Oct 8 07:43:52 panmgt01p 1,Receive Time: 2023/10/08 07:43:52,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.147.10,Destination Address: 157.240.8.1,NAT Source IP: 134.7.244.10,NAT Destination IP: 157.240.8.1,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: facebook-base,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 73623135,Repeat Count: 1,Source Port: 57114,Destination Port: 443,NAT Source Port: 37156,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 41096,Bytes Sent: 31226,Bytes Received: 9870,Packets: 168,Start Time: 2023/10/08 07:42:00,Elapsed Time: 110,Category: social-networking,Sequence Number: 7253419122095717450,Source Country: 10.0.0.0-10.255.255.255,Destination Country: Australia,Packets Sent: 86,Packets Received: 82,Session End Reason: tcp-rst-from-server,Application Subcategory: social-networking,Application Category: saas,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use is-saas no-certifications,Tunneled Application: facebook-base
Print each key and value for the log
Oct 3 20:35:50 panmgt01p 1,2023/10/03 20:35:50,012501002341,THREAT,url,2561,2023/10/03 20:35:45,10.130.140.28,23.220.77.34,134.7.244.28,23.220.77.34,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/03 20:35:45,43452033,1,36222,443,34284,443,0x40f400,tcp,alert,api-shein.shein.com/,9999(9999),shopping,informational,client-to-server,7253419068304819580,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,shopping low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-03T20:35:45.146+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
FUTURE_USE: Oct 3 20:35:50 panmgt01p 1,Receive Time: 2023/10/03 20:35:50,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.140.28,Destination Address: 23.220.77.34,NAT Source IP: 134.7.244.28,NAT Destination IP: 23.220.77.34,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 43452033,Repeat Count: 1,Source Port: 36222,Destination Port: 443,NAT Source Port: 34284,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: shopping,Sequence Number: 7253419068304819580,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 3 19:56:01 panmgt01p 1,2023/10/03 19:56:00,012501002341,THREAT,url,2561,2023/10/03 19:55:59,10.130.140.249,162.247.243.29,134.7.244.249,162.247.243.29,Curtin-CS-Research-Out,student\XXXXXXXX,,new-relic,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/03 19:55:59,67445023,1,65191,443,44922,443,0x40f400,tcp,alert,bam.nr-data.net/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068301604510,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-03T19:55:59.002+08:00,,,,management,saas,browser-based,2,has-known-vulnerability pervasive-use is-saas is-soc2 is-ssae16 is-poor-terms-of-service,,new-relic,yes,no,
FUTURE_USE: Oct 3 19:56:01 panmgt01p 1,Receive Time: 2023/10/03 19:56:00,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.140.249,Destination Address: 162.247.243.29,NAT Source IP: 134.7.244.249,NAT Destination IP: 162.247.243.29,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: new-relic,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 67445023,Repeat Count: 1,Source Port: 65191,Destination Port: 443,NAT Source Port: 44922,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068301604510,Application Subcategory: management,Application Category: saas,Application Risk: 2,Application Characteristic: has-known-vulnerability pervasive-use is-saas is-soc2 is-ssae16 is-poor-terms-of-service,Tunneled Application: new-relic
Print each key and value for the log
Oct 2 07:58:05 panmgt01p 1,2023/10/02 07:58:05,012501002341,TRAFFIC,end,2561,2023/10/02 07:58:04,10.130.179.109,17.248.219.4,134.7.244.109,17.248.219.4,Curtin-CS-Research-Out,student\XXXXXXXX,,icloud-base,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/02 07:58:04,6826304,1,55364,443,41722,443,0x40447a,tcp,allow,12983,4174,8809,40,2023/10/02 07:57:45,18,online-storage-and-backup,,7253419117371596812,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,21,19,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-02T07:58:04.843+08:00,,,internet-utility,saas,client-server,2,able-to-transfer-file pervasive-use is-saas no-certifications,icloud,icloud-base,yes,no,0
FUTURE_USE: Oct 2 07:58:05 panmgt01p 1,Receive Time: 2023/10/02 07:58:05,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.179.109,Destination Address: 17.248.219.4,NAT Source IP: 134.7.244.109,NAT Destination IP: 17.248.219.4,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: icloud-base,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 6826304,Repeat Count: 1,Source Port: 55364,Destination Port: 443,NAT Source Port: 41722,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 12983,Bytes Sent: 4174,Bytes Received: 8809,Packets: 40,Start Time: 2023/10/02 07:57:45,Elapsed Time: 18,Category: online-storage-and-backup,Sequence Number: 7253419117371596812,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 21,Packets Received: 19,Session End Reason: tcp-fin,Application Subcategory: internet-utility,Application Category: saas,Application Risk: 2,Application Characteristic: able-to-transfer-file pervasive-use is-saas no-certifications,Tunneled Application: icloud-base
Print each key and value for the log
Oct 6 19:51:18 panmgt01p 1,2023/10/06 19:51:18,012501002341,THREAT,url,2561,2023/10/06 19:51:14,10.130.162.248,157.240.8.18,134.7.244.248,157.240.8.18,Curtin-CS-Research-Out,student\XXXXXXXX,,facebook-base,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/06 19:51:14,3505320,1,58496,443,36813,443,0x40f400,tcp,alert,graph.facebook.com/,9999(9999),social-networking,informational,client-to-server,7253419068707568771,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,social-networking low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-06T19:51:14.471+08:00,,,,social-networking,saas,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use is-saas no-certifications,facebook,facebook-base,yes,no,
FUTURE_USE: Oct 6 19:51:18 panmgt01p 1,Receive Time: 2023/10/06 19:51:18,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.162.248,Destination Address: 157.240.8.18,NAT Source IP: 134.7.244.248,NAT Destination IP: 157.240.8.18,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: facebook-base,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 3505320,Repeat Count: 1,Source Port: 58496,Destination Port: 443,NAT Source Port: 36813,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: social-networking,Sequence Number: 7253419068707568771,Application Subcategory: social-networking,Application Category: saas,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use is-saas no-certifications,Tunneled Application: facebook-base
Print each key and value for the log
Oct 2 02:23:38 panmgt01p 1,2023/10/02 02:23:38,012501002341,TRAFFIC,end,2561,2023/10/02 02:23:38,10.130.185.74,172.217.24.42,134.7.244.74,172.217.24.42,Curtin-CS-Research-Out,student\XXXXXXXX,,google-play,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/02 02:23:38,68173113,1,53585,443,43287,443,0x40447a,tcp,allow,10971,3781,7190,32,2023/10/02 02:23:22,16,computer-and-internet-info,,7253419117264628134,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,14,18,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-02T02:23:38.435+08:00,,,internet-utility,general-internet,browser-based,3,consume-big-bandwidth able-to-transfer-file has-known-vulnerability pervasive-use,,google-play,no,no,0
FUTURE_USE: Oct 2 02:23:38 panmgt01p 1,Receive Time: 2023/10/02 02:23:38,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.185.74,Destination Address: 172.217.24.42,NAT Source IP: 134.7.244.74,NAT Destination IP: 172.217.24.42,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: google-play,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 68173113,Repeat Count: 1,Source Port: 53585,Destination Port: 443,NAT Source Port: 43287,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 10971,Bytes Sent: 3781,Bytes Received: 7190,Packets: 32,Start Time: 2023/10/02 02:23:22,Elapsed Time: 16,Category: computer-and-internet-info,Sequence Number: 7253419117264628134,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 14,Packets Received: 18,Session End Reason: tcp-fin,Application Subcategory: internet-utility,Application Category: general-internet,Application Risk: 3,Application Characteristic: consume-big-bandwidth able-to-transfer-file has-known-vulnerability pervasive-use,Tunneled Application: google-play
Print each key and value for the log
Oct 5 10:21:11 panmgt01p 1,2023/10/05 10:21:10,012501002341,THREAT,url,2561,2023/10/05 10:21:10,10.130.151.92,52.109.112.145,134.7.244.92,52.109.112.145,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/05 10:21:10,37326581,1,55350,443,47253,443,0x40f400,tcp,alert,roaming.officeapps.live.com/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068504964536,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-05T10:21:10.272+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
FUTURE_USE: Oct 5 10:21:11 panmgt01p 1,Receive Time: 2023/10/05 10:21:10,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.151.92,Destination Address: 52.109.112.145,NAT Source IP: 134.7.244.92,NAT Destination IP: 52.109.112.145,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 37326581,Repeat Count: 1,Source Port: 55350,Destination Port: 443,NAT Source Port: 47253,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068504964536,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 7 09:57:07 panmgt01p 1,2023/10/07 09:57:06,012501002341,THREAT,url,2561,2023/10/07 09:57:02,10.130.136.204,208.67.220.220,134.7.244.204,208.67.220.220,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/07 09:57:02,36619975,1,59744,443,25141,443,0x40f400,tcp,alert,dns.umbrella.com/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068758339224,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-07T09:57:02.496+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
FUTURE_USE: Oct 7 09:57:07 panmgt01p 1,Receive Time: 2023/10/07 09:57:06,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.136.204,Destination Address: 208.67.220.220,NAT Source IP: 134.7.244.204,NAT Destination IP: 208.67.220.220,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 36619975,Repeat Count: 1,Source Port: 59744,Destination Port: 443,NAT Source Port: 25141,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068758339224,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 1 14:08:22 panmgt01p 1,2023/10/01 14:08:22,012501002341,THREAT,url,2561,2023/10/01 14:08:17,10.130.173.59,130.44.212.78,134.7.244.59,130.44.212.78,Curtin-CS-Research-Out,student\XXXXXXXX,,tiktok,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/01 14:08:17,9418343,1,55831,443,46935,443,0x40f400,tcp,alert,pitaya-task-va.tiktokv.com/,9999(9999),social-networking,informational,client-to-server,7253419067992275711,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,social-networking low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-01T14:08:17.403+08:00,,,,photo-video,media,client-server,2,able-to-transfer-file has-known-vulnerability,,tiktok,no,no,
FUTURE_USE: Oct 1 14:08:22 panmgt01p 1,Receive Time: 2023/10/01 14:08:22,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.173.59,Destination Address: 130.44.212.78,NAT Source IP: 134.7.244.59,NAT Destination IP: 130.44.212.78,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: tiktok,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 9418343,Repeat Count: 1,Source Port: 55831,Destination Port: 443,NAT Source Port: 46935,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: social-networking,Sequence Number: 7253419067992275711,Application Subcategory: photo-video,Application Category: media,Application Risk: 2,Application Characteristic: able-to-transfer-file has-known-vulnerability,Tunneled Application: tiktok
Print each key and value for the log
Oct 5 21:06:17 panmgt01p 1,2023/10/05 21:06:17,012501002341,THREAT,url,2561,2023/10/05 21:06:12,10.128.46.201,51.105.71.137,134.7.240.201,51.105.71.137,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/05 21:06:12,35997875,1,64915,443,27122,443,0x40f400,tcp,alert,uk-v20.events.data.microsoft.com/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068583988350,0x8000000000000000,10.0.0.0-10.255.255.255,United Kingdom,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-05T21:06:12.594+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
FUTURE_USE: Oct 5 21:06:17 panmgt01p 1,Receive Time: 2023/10/05 21:06:17,Type: THREAT,Threat/Content Type: url,Source Address: 10.128.46.201,Destination Address: 51.105.71.137,NAT Source IP: 134.7.240.201,NAT Destination IP: 51.105.71.137,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 35997875,Repeat Count: 1,Source Port: 64915,Destination Port: 443,NAT Source Port: 27122,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068583988350,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 6 18:27:04 panmgt01p 1,2023/10/06 18:27:04,012501002341,TRAFFIC,end,2561,2023/10/06 18:27:03,10.130.183.24,118.25.164.38,134.7.244.24,118.25.164.38,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/06 18:27:03,77362567,1,56857,443,20768,443,0x40447a,tcp,allow,9654,3868,5786,28,2023/10/06 18:25:49,74,social-networking,,7253419121270714854,0x8000000000000000,10.0.0.0-10.255.255.255,China,,13,15,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-06T18:27:03.504+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
FUTURE_USE: Oct 6 18:27:04 panmgt01p 1,Receive Time: 2023/10/06 18:27:04,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.183.24,Destination Address: 118.25.164.38,NAT Source IP: 134.7.244.24,NAT Destination IP: 118.25.164.38,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 77362567,Repeat Count: 1,Source Port: 56857,Destination Port: 443,NAT Source Port: 20768,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 9654,Bytes Sent: 3868,Bytes Received: 5786,Packets: 28,Start Time: 2023/10/06 18:25:49,Elapsed Time: 74,Category: social-networking,Sequence Number: 7253419121270714854,Source Country: 10.0.0.0-10.255.255.255,Destination Country: China,Packets Sent: 13,Packets Received: 15,Session End Reason: tcp-rst-from-client,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 4 17:14:32 panmgt01p 1,2023/10/04 17:14:32,012501002341,TRAFFIC,end,2561,2023/10/04 17:14:31,10.128.249.6,172.217.24.46,134.7.240.6,172.217.24.46,Curtin-CS-Research-Out-IP,,,google-analytics,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 17:14:31,6883957,1,36556,443,14664,443,0x40447a,tcp,allow,4378,2369,2009,33,2023/10/04 17:11:24,185,computer-and-internet-info,,7253419119565028381,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,18,15,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,eecde31f-a132-47c2-b9c8-eee0badc7cda,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T17:14:32.001+08:00,,,internet-utility,general-internet,browser-based,2,evasive-behavior pervasive-use is-saas no-certifications,,google-analytics,yes,no,0
FUTURE_USE: Oct 4 17:14:32 panmgt01p 1,Receive Time: 2023/10/04 17:14:32,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.128.249.6,Destination Address: 172.217.24.46,NAT Source IP: 134.7.240.6,NAT Destination IP: 172.217.24.46,Rule Name: Curtin-CS-Research-Out-IP,Application: google-analytics,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 6883957,Repeat Count: 1,Source Port: 36556,Destination Port: 443,NAT Source Port: 14664,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 4378,Bytes Sent: 2369,Bytes Received: 2009,Packets: 33,Start Time: 2023/10/04 17:11:24,Elapsed Time: 185,Category: computer-and-internet-info,Sequence Number: 7253419119565028381,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 18,Packets Received: 15,Session End Reason: tcp-fin,Application Subcategory: internet-utility,Application Category: general-internet,Application Risk: 2,Application Characteristic: evasive-behavior pervasive-use is-saas no-certifications,Tunneled Application: google-analytics
Print each key and value for the log
Oct 6 18:53:56 panmgt01p 1,2023/10/06 18:53:55,012501002341,THREAT,url,2561,2023/10/06 18:53:50,10.130.184.203,20.99.128.106,134.7.244.203,20.99.128.106,Curtin-CS-Research-Out,student\XXXXXXXX,,xbox-live,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/06 18:53:50,69531744,1,64355,443,59002,443,0x40f400,tcp,alert,user.auth.xboxlive.com/,9999(9999),games,informational,client-to-server,7253419068703453398,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,games low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-06T18:53:50.263+08:00,,,,gaming,media,client-server,3,consume-big-bandwidth has-known-vulnerability tunnel-other-application pervasive-use,,xbox-live,no,no,
FUTURE_USE: Oct 6 18:53:56 panmgt01p 1,Receive Time: 2023/10/06 18:53:55,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.184.203,Destination Address: 20.99.128.106,NAT Source IP: 134.7.244.203,NAT Destination IP: 20.99.128.106,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: xbox-live,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 69531744,Repeat Count: 1,Source Port: 64355,Destination Port: 443,NAT Source Port: 59002,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: games,Sequence Number: 7253419068703453398,Application Subcategory: gaming,Application Category: media,Application Risk: 3,Application Characteristic: consume-big-bandwidth has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: xbox-live
Print each key and value for the log
Oct 3 16:42:54 panmgt01p 1,2023/10/03 16:42:54,012501002341,TRAFFIC,end,2561,2023/10/03 16:42:54,10.130.161.208,157.240.8.18,134.7.244.208,157.240.8.18,Curtin-CS-Research-Out,student\XXXXXXXX,,facebook-base,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/03 16:42:54,68380638,1,58751,443,39467,443,0x40447a,tcp,allow,75890,7154,68736,118,2023/10/03 16:42:35,18,social-networking,,7253419118691581217,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,50,68,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-03T16:42:54.445+08:00,,,social-networking,saas,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use is-saas no-certifications,facebook,facebook-base,yes,no,0
FUTURE_USE: Oct 3 16:42:54 panmgt01p 1,Receive Time: 2023/10/03 16:42:54,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.161.208,Destination Address: 157.240.8.18,NAT Source IP: 134.7.244.208,NAT Destination IP: 157.240.8.18,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: facebook-base,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 68380638,Repeat Count: 1,Source Port: 58751,Destination Port: 443,NAT Source Port: 39467,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 75890,Bytes Sent: 7154,Bytes Received: 68736,Packets: 118,Start Time: 2023/10/03 16:42:35,Elapsed Time: 18,Category: social-networking,Sequence Number: 7253419118691581217,Source Country: 10.0.0.0-10.255.255.255,Destination Country: Australia,Packets Sent: 50,Packets Received: 68,Session End Reason: tcp-rst-from-client,Application Subcategory: social-networking,Application Category: saas,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use is-saas no-certifications,Tunneled Application: facebook-base
Print each key and value for the log
Oct 6 11:07:05 panmgt01p 1,2023/10/06 11:07:04,012501002341,TRAFFIC,end,2561,2023/10/06 11:07:05,10.130.162.214,13.107.5.93,134.7.244.214,13.107.5.93,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/06 11:07:05,2605109,1,62812,443,20928,443,0x40447a,tcp,allow,10543,2550,7993,32,2023/10/06 11:06:48,17,computer-and-internet-info,,7253419120936749292,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,14,18,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-06T11:07:05.794+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
FUTURE_USE: Oct 6 11:07:05 panmgt01p 1,Receive Time: 2023/10/06 11:07:04,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.162.214,Destination Address: 13.107.5.93,NAT Source IP: 134.7.244.214,NAT Destination IP: 13.107.5.93,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 2605109,Repeat Count: 1,Source Port: 62812,Destination Port: 443,NAT Source Port: 20928,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 10543,Bytes Sent: 2550,Bytes Received: 7993,Packets: 32,Start Time: 2023/10/06 11:06:48,Elapsed Time: 17,Category: computer-and-internet-info,Sequence Number: 7253419120936749292,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 14,Packets Received: 18,Session End Reason: tcp-fin,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 5 14:01:42 panmgt01p 1,2023/10/05 14:01:41,012501002341,TRAFFIC,end,2561,2023/10/05 14:01:41,10.130.153.28,40.100.146.178,134.7.244.28,40.100.146.178,Curtin-CS-Research-Out,student\XXXXXXXX,,outlook-web-online,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/05 14:01:41,70179674,1,54909,443,1272,443,0x40447a,tcp,allow,18350,4684,13666,52,2023/10/05 13:59:27,131,computer-and-internet-info,,7253419120261371449,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,24,28,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-05T14:01:41.591+08:00,,,email,saas,browser-based,3,able-to-transfer-file has-known-vulnerability pervasive-use is-saas is-fedramp is-soc1 is-soc2 is-ip-based-restrictions,ms-office365,outlook-web-online,yes,no,0
FUTURE_USE: Oct 5 14:01:42 panmgt01p 1,Receive Time: 2023/10/05 14:01:41,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.153.28,Destination Address: 40.100.146.178,NAT Source IP: 134.7.244.28,NAT Destination IP: 40.100.146.178,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: outlook-web-online,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 70179674,Repeat Count: 1,Source Port: 54909,Destination Port: 443,NAT Source Port: 1272,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 18350,Bytes Sent: 4684,Bytes Received: 13666,Packets: 52,Start Time: 2023/10/05 13:59:27,Elapsed Time: 131,Category: computer-and-internet-info,Sequence Number: 7253419120261371449,Source Country: 10.0.0.0-10.255.255.255,Destination Country: Australia,Packets Sent: 24,Packets Received: 28,Session End Reason: tcp-fin,Application Subcategory: email,Application Category: saas,Application Risk: 3,Application Characteristic: able-to-transfer-file has-known-vulnerability pervasive-use is-saas is-fedramp is-soc1 is-soc2 is-ip-based-restrictions,Tunneled Application: outlook-web-online
Print each key and value for the log
Oct 5 07:42:03 panmgt01p 1,2023/10/05 07:42:03,012501002341,THREAT,url,2561,2023/10/05 07:41:58,10.130.144.163,172.217.24.46,134.7.244.163,172.217.24.46,Curtin-CS-Research-Out,student\XXXXXXXX,,google-base,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/05 07:41:58,34292128,1,46578,443,58912,443,0x40f400,tcp,alert,clients4.google.com/,9999(9999),search-engines,informational,client-to-server,7253419068485208793,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,search-engines low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-05T07:41:58.701+08:00,,,,internet-utility,general-internet,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,google-base,no,no,
FUTURE_USE: Oct 5 07:42:03 panmgt01p 1,Receive Time: 2023/10/05 07:42:03,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.144.163,Destination Address: 172.217.24.46,NAT Source IP: 134.7.244.163,NAT Destination IP: 172.217.24.46,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: google-base,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 34292128,Repeat Count: 1,Source Port: 46578,Destination Port: 443,NAT Source Port: 58912,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: search-engines,Sequence Number: 7253419068485208793,Application Subcategory: internet-utility,Application Category: general-internet,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: google-base
Print each key and value for the log
Oct 3 14:19:13 panmgt01p 1,2023/10/03 14:19:12,012501002341,TRAFFIC,end,2561,2023/10/03 14:19:12,10.130.145.77,151.101.129.140,134.7.244.77,151.101.129.140,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/03 14:19:12,41777804,1,46756,443,41334,443,0x40447a,tcp,allow,351038,16411,334627,487,2023/10/03 14:18:40,31,news,,7253419118563021451,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,219,268,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-03T14:19:12.966+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
FUTURE_USE: Oct 3 14:19:13 panmgt01p 1,Receive Time: 2023/10/03 14:19:12,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.145.77,Destination Address: 151.101.129.140,NAT Source IP: 134.7.244.77,NAT Destination IP: 151.101.129.140,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 41777804,Repeat Count: 1,Source Port: 46756,Destination Port: 443,NAT Source Port: 41334,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 351038,Bytes Sent: 16411,Bytes Received: 334627,Packets: 487,Start Time: 2023/10/03 14:18:40,Elapsed Time: 31,Category: news,Sequence Number: 7253419118563021451,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 219,Packets Received: 268,Session End Reason: tcp-rst-from-client,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 3 13:22:37 panmgt01p 1,2023/10/03 13:22:36,012501002341,TRAFFIC,end,2561,2023/10/03 13:22:35,10.128.51.237,52.98.142.210,134.7.240.237,52.98.142.210,Curtin-CS-Research-Out,student\XXXXXXXX,,outlook-web-online,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/03 13:22:35,77126381,1,53344,443,35854,443,0x40447a,tcp,allow,740214,348300,391914,829,2023/10/03 12:30:42,3113,computer-and-internet-info,,7253419118508642206,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,403,426,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-03T13:22:36.287+08:00,,,email,saas,browser-based,3,able-to-transfer-file has-known-vulnerability pervasive-use is-saas is-fedramp is-soc1 is-soc2 is-ip-based-restrictions,ms-office365,outlook-web-online,yes,no,0
FUTURE_USE: Oct 3 13:22:37 panmgt01p 1,Receive Time: 2023/10/03 13:22:36,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.128.51.237,Destination Address: 52.98.142.210,NAT Source IP: 134.7.240.237,NAT Destination IP: 52.98.142.210,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: outlook-web-online,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 77126381,Repeat Count: 1,Source Port: 53344,Destination Port: 443,NAT Source Port: 35854,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 740214,Bytes Sent: 348300,Bytes Received: 391914,Packets: 829,Start Time: 2023/10/03 12:30:42,Elapsed Time: 3113,Category: computer-and-internet-info,Sequence Number: 7253419118508642206,Source Country: 10.0.0.0-10.255.255.255,Destination Country: Australia,Packets Sent: 403,Packets Received: 426,Session End Reason: tcp-fin,Application Subcategory: email,Application Category: saas,Application Risk: 3,Application Characteristic: able-to-transfer-file has-known-vulnerability pervasive-use is-saas is-fedramp is-soc1 is-soc2 is-ip-based-restrictions,Tunneled Application: outlook-web-online
Print each key and value for the log
Oct 4 03:22:27 panmgt01p 1,2023/10/04 03:22:27,012501002341,TRAFFIC,end,2561,2023/10/04 03:22:25,10.130.161.193,43.129.255.246,134.7.244.193,43.129.255.246,Curtin-CS-Research-Out,student\XXXXXXXX,,wechat-base,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 03:22:25,34418027,1,56189,80,4415,80,0x40401c,tcp,allow,1400,1034,366,9,2023/10/04 03:22:09,0,internet-communications-and-telephony,,7253419118996734416,0x8000000000000000,10.0.0.0-10.255.255.255,Hong Kong,,5,4,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T03:22:26.291+08:00,,,instant-messaging,collaboration,client-server,2,has-known-vulnerability pervasive-use,wechat,wechat-base,no,no,0
FUTURE_USE: Oct 4 03:22:27 panmgt01p 1,Receive Time: 2023/10/04 03:22:27,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.161.193,Destination Address: 43.129.255.246,NAT Source IP: 134.7.244.193,NAT Destination IP: 43.129.255.246,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: wechat-base,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 34418027,Repeat Count: 1,Source Port: 56189,Destination Port: 80,NAT Source Port: 4415,NAT Destination Port: 80,Flags: 0x40401c,Protocol: tcp,Action: allow,Bytes: 1400,Bytes Sent: 1034,Bytes Received: 366,Packets: 9,Start Time: 2023/10/04 03:22:09,Elapsed Time: 0,Category: internet-communications-and-telephony,Sequence Number: 7253419118996734416,Source Country: 10.0.0.0-10.255.255.255,Destination Country: Hong Kong,Packets Sent: 5,Packets Received: 4,Session End Reason: tcp-fin,Application Subcategory: instant-messaging,Application Category: collaboration,Application Risk: 2,Application Characteristic: has-known-vulnerability pervasive-use,Tunneled Application: wechat-base
Print each key and value for the log
Oct 3 14:10:19 panmgt01p 1,2023/10/03 14:10:18,012501002341,TRAFFIC,end,2561,2023/10/03 14:10:17,10.130.169.96,34.117.67.69,134.7.244.96,34.117.67.69,Curtin-CS-Research-Out,student\XXXXXXXX,,incomplete,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/03 14:10:17,73694643,1,55909,80,59334,80,0x40401a,tcp,allow,220,142,78,3,2023/10/03 14:10:11,0,any,,7253419118554601475,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,2,1,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-03T14:10:18.362+08:00,,,unknown,unknown,unknown,1,,,incomplete,no,no,0
FUTURE_USE: Oct 3 14:10:19 panmgt01p 1,Receive Time: 2023/10/03 14:10:18,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.169.96,Destination Address: 34.117.67.69,NAT Source IP: 134.7.244.96,NAT Destination IP: 34.117.67.69,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: incomplete,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 73694643,Repeat Count: 1,Source Port: 55909,Destination Port: 80,NAT Source Port: 59334,NAT Destination Port: 80,Flags: 0x40401a,Protocol: tcp,Action: allow,Bytes: 220,Bytes Sent: 142,Bytes Received: 78,Packets: 3,Start Time: 2023/10/03 14:10:11,Elapsed Time: 0,Category: any,Sequence Number: 7253419118554601475,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 2,Packets Received: 1,Session End Reason: tcp-rst-from-client,Application Subcategory: unknown,Application Category: unknown,Application Risk: 1,Tunneled Application: incomplete
Print each key and value for the log
Oct 1 19:05:52 panmgt01p 1,2023/10/01 19:05:51,012501002341,THREAT,url,2561,2023/10/01 19:05:49,10.130.159.149,23.48.50.23,134.7.244.149,23.48.50.23,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/01 19:05:49,39242997,1,54890,443,12816,443,0x40f400,tcp,alert,amp-api.media.apple.com/,9999(9999),computer-and-internet-info,informational,client-to-server,7253419068015806509,0x8000000000000000,10.0.0.0-10.255.255.255,Australia,,,0,,,0,,,,,,,,0,34,0,0,0,,b309-fu-fw,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,computer-and-internet-info low-risk,90431d13-81da-4129-8bc5-ce968fa06b76,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2023-10-01T19:05:49.539+08:00,,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,
FUTURE_USE: Oct 1 19:05:52 panmgt01p 1,Receive Time: 2023/10/01 19:05:51,Type: THREAT,Threat/Content Type: url,Source Address: 10.130.159.149,Destination Address: 23.48.50.23,NAT Source IP: 134.7.244.149,NAT Destination IP: 23.48.50.23,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 39242997,Repeat Count: 1,Source Port: 54890,Destination Port: 443,NAT Source Port: 12816,NAT Destination Port: 443,Flags: 0x40f400,Action: alert,Category: computer-and-internet-info,Sequence Number: 7253419068015806509,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 6 12:01:41 panmgt01p 1,2023/10/06 12:01:40,012501002341,TRAFFIC,end,2561,2023/10/06 12:01:40,10.130.182.2,207.65.33.78,134.7.244.2,207.65.33.78,Curtin-CS-Research-Out,student\XXXXXXXX,,incomplete,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/06 12:01:40,75777764,1,55955,443,8930,443,0x404019,tcp,allow,210,70,140,3,2023/10/06 12:01:35,4,any,,7253419120985107749,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,1,2,unknown,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-06T12:01:40.873+08:00,,,unknown,unknown,unknown,1,,,incomplete,no,no,0
FUTURE_USE: Oct 6 12:01:41 panmgt01p 1,Receive Time: 2023/10/06 12:01:40,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.182.2,Destination Address: 207.65.33.78,NAT Source IP: 134.7.244.2,NAT Destination IP: 207.65.33.78,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: incomplete,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 75777764,Repeat Count: 1,Source Port: 55955,Destination Port: 443,NAT Source Port: 8930,NAT Destination Port: 443,Flags: 0x404019,Protocol: tcp,Action: allow,Bytes: 210,Bytes Sent: 70,Bytes Received: 140,Packets: 3,Start Time: 2023/10/06 12:01:35,Elapsed Time: 4,Category: any,Sequence Number: 7253419120985107749,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 1,Packets Received: 2,Session End Reason: unknown,Application Subcategory: unknown,Application Category: unknown,Application Risk: 1,Tunneled Application: incomplete
Print each key and value for the log
Oct 5 18:24:08 panmgt01p 1,2023/10/05 18:24:07,012501002341,TRAFFIC,end,2561,2023/10/05 18:24:06,10.130.152.66,20.189.173.16,134.7.244.66,20.189.173.16,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/05 18:24:06,73400966,1,52433,443,11523,443,0x40447a,tcp,allow,13323,5634,7689,30,2023/10/05 18:23:37,26,computer-and-internet-info,,7253419120471317467,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,15,15,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-05T18:24:07.063+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
FUTURE_USE: Oct 5 18:24:08 panmgt01p 1,Receive Time: 2023/10/05 18:24:07,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.152.66,Destination Address: 20.189.173.16,NAT Source IP: 134.7.244.66,NAT Destination IP: 20.189.173.16,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 73400966,Repeat Count: 1,Source Port: 52433,Destination Port: 443,NAT Source Port: 11523,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 13323,Bytes Sent: 5634,Bytes Received: 7689,Packets: 30,Start Time: 2023/10/05 18:23:37,Elapsed Time: 26,Category: computer-and-internet-info,Sequence Number: 7253419120471317467,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 15,Packets Received: 15,Session End Reason: tcp-rst-from-client,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 7 17:23:02 panmgt01p 1,2023/10/07 17:23:01,012501002341,TRAFFIC,end,2561,2023/10/07 17:23:01,10.130.162.130,119.63.197.151,134.7.244.130,119.63.197.151,Curtin-CS-Research-Out,student\XXXXXXXX,,incomplete,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/07 17:23:01,1585225,1,54793,80,45186,80,0x40401a,tcp,allow,620,550,70,10,2023/10/07 17:21:50,55,any,,7253419121793342730,0x8000000000000000,10.0.0.0-10.255.255.255,Japan,,9,1,tcp-rst-from-client,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-07T17:23:01.649+08:00,,,unknown,unknown,unknown,1,,,incomplete,no,no,0
FUTURE_USE: Oct 7 17:23:02 panmgt01p 1,Receive Time: 2023/10/07 17:23:01,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.162.130,Destination Address: 119.63.197.151,NAT Source IP: 134.7.244.130,NAT Destination IP: 119.63.197.151,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: incomplete,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 1585225,Repeat Count: 1,Source Port: 54793,Destination Port: 80,NAT Source Port: 45186,NAT Destination Port: 80,Flags: 0x40401a,Protocol: tcp,Action: allow,Bytes: 620,Bytes Sent: 550,Bytes Received: 70,Packets: 10,Start Time: 2023/10/07 17:21:50,Elapsed Time: 55,Category: any,Sequence Number: 7253419121793342730,Source Country: 10.0.0.0-10.255.255.255,Destination Country: Japan,Packets Sent: 9,Packets Received: 1,Session End Reason: tcp-rst-from-client,Application Subcategory: unknown,Application Category: unknown,Application Risk: 1,Tunneled Application: incomplete
Print each key and value for the log
Oct 4 10:03:34 panmgt01p 1,2023/10/04 10:03:33,012501002341,TRAFFIC,end,2561,2023/10/04 10:03:32,10.130.129.40,13.32.127.123,134.7.244.40,13.32.127.123,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/04 10:03:32,43411727,1,50512,443,12092,443,0x40447a,tcp,allow,8070,1965,6105,30,2023/10/04 10:02:23,67,computer-and-internet-info,,7253419119184040334,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,14,16,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-04T10:03:33.740+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
FUTURE_USE: Oct 4 10:03:34 panmgt01p 1,Receive Time: 2023/10/04 10:03:33,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.129.40,Destination Address: 13.32.127.123,NAT Source IP: 134.7.244.40,NAT Destination IP: 13.32.127.123,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 43411727,Repeat Count: 1,Source Port: 50512,Destination Port: 443,NAT Source Port: 12092,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 8070,Bytes Sent: 1965,Bytes Received: 6105,Packets: 30,Start Time: 2023/10/04 10:02:23,Elapsed Time: 67,Category: computer-and-internet-info,Sequence Number: 7253419119184040334,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 14,Packets Received: 16,Session End Reason: tcp-fin,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 5 11:32:12 panmgt01p 1,2023/10/05 11:32:12,012501002341,TRAFFIC,end,2561,2023/10/05 11:32:11,10.130.147.11,35.172.84.132,134.7.244.11,35.172.84.132,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/05 11:32:11,75904476,1,50640,443,28796,443,0x40447a,tcp,allow,12139,3222,8917,38,2023/10/05 11:30:53,76,business-and-economy,,7253419120118920130,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,16,22,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-05T11:32:11.832+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
FUTURE_USE: Oct 5 11:32:12 panmgt01p 1,Receive Time: 2023/10/05 11:32:12,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.147.11,Destination Address: 35.172.84.132,NAT Source IP: 134.7.244.11,NAT Destination IP: 35.172.84.132,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 75904476,Repeat Count: 1,Source Port: 50640,Destination Port: 443,NAT Source Port: 28796,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 12139,Bytes Sent: 3222,Bytes Received: 8917,Packets: 38,Start Time: 2023/10/05 11:30:53,Elapsed Time: 76,Category: business-and-economy,Sequence Number: 7253419120118920130,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 16,Packets Received: 22,Session End Reason: tcp-fin,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
Print each key and value for the log
Oct 6 13:46:29 panmgt01p 1,2023/10/06 13:46:29,012501002341,TRAFFIC,end,2561,2023/10/06 13:46:29,10.130.134.72,54.87.2.101,134.7.244.72,54.87.2.101,Curtin-CS-Research-Out,student\XXXXXXXX,,ssl,vsys1,bdr-trust,bdr-untrust,ethernet1/23,ethernet1/24,SPLUNK LOG FP,2023/10/06 13:46:29,38734740,1,47154,443,53148,443,0x40447a,tcp,allow,29463,15633,13830,99,2023/10/06 13:44:38,111,computer-and-internet-info,,7253419121075457403,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,52,47,tcp-fin,34,0,0,0,,b309-fu-fw,from-policy,,,0,,0,,N/A,0,0,0,0,90431d13-81da-4129-8bc5-ce968fa06b76,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-06T13:46:29.209+08:00,,,encrypted-tunnel,networking,browser-based,4,used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,,ssl,no,no,0
FUTURE_USE: Oct 6 13:46:29 panmgt01p 1,Receive Time: 2023/10/06 13:46:29,Type: TRAFFIC,Threat/Content Type: end,Source Address: 10.130.134.72,Destination Address: 54.87.2.101,NAT Source IP: 134.7.244.72,NAT Destination IP: 54.87.2.101,Rule Name: Curtin-CS-Research-Out,Source User: student\XXXXXXXX,Application: ssl,Virtual System: vsys1,Source Zone: bdr-trust,Destination Zone: bdr-untrust,Inbound Interface: ethernet1/23,Outbound Interface: ethernet1/24,Log Action: SPLUNK LOG FP,Session ID: 38734740,Repeat Count: 1,Source Port: 47154,Destination Port: 443,NAT Source Port: 53148,NAT Destination Port: 443,Flags: 0x40447a,Protocol: tcp,Action: allow,Bytes: 29463,Bytes Sent: 15633,Bytes Received: 13830,Packets: 99,Start Time: 2023/10/06 13:44:38,Elapsed Time: 111,Category: computer-and-internet-info,Sequence Number: 7253419121075457403,Source Country: 10.0.0.0-10.255.255.255,Destination Country: United States,Packets Sent: 52,Packets Received: 47,Session End Reason: tcp-fin,Application Subcategory: encrypted-tunnel,Application Category: networking,Application Risk: 4,Application Characteristic: used-by-malware able-to-transfer-file has-known-vulnerability tunnel-other-application pervasive-use,Tunneled Application: ssl
End of preview.
README.md exists but content is empty. Use the Edit dataset card button to edit it.
Downloads last month
33