Skip to main content
Skip table of contents

Origin MAC Address

The MAC Address from which activity originated.

Data Type

String

Aliases

UseAlias

Client Console Full Name

MAC Address (Origin)

Client Console Short Name

Not applicable

Web Console Tab/Name

MAC Address (Origin)

Elasticsearch Field Name

originMac

Rule Builder Column Name

SMAC

Regex Pattern

<smac>

NetMon Name

SrcMAC

Field Relationships

  • SIP
  • SIPv4
  • SIPv6
  • SIPv6E
  • Origin Hostname
  • Origin Hostname or IP
  • Origin NAT IP
  • DIP
  • DIPv4
  • DIPv6
  • DIPv6E
  • Impacted Hostname
  • Impacted Hostname or IP
  • Impacted NAT IP
  • Origin Port
  • Origin NAT Port
  • Impacted Port
  • Impacted NAT Port
  • Impacted MAC Address
  • Origin Interface
  • Impacted Interface
  • Origin Domain
  • Impacted Domain
  • Origin Login
  • Impacted Account
  • IANA Protocol Number
  • IANA Protocol Name

Common Applications

  • Firewall
  • IDS/IPS
  • Vulnerability scanners

Use Case

  • Differentiating hosts and interfaces.
  • Detecting MAC ID cloning.

MPE/Data Masking Manipulations

Not applicable.

Usage Standards

  • Can be in any format of MAC address:
    • MM:MM:MM:SS:SS:SS
    • MM-MM-MM-SS-SS-SS
    • MMM.MMM.SSS.SSS
    • MM MM MM SS SS SS
  • Origin is Client (In Client-Server Model)
  • Origin is Attacker (In Attacker-Target Model)

Examples

  • FireEye Web MPS

02 01 2016 17:13:19 1.1.1.1 <LOC4:WARN> fenotify-609081.warning: CEF:0|FireEye|MPS|1.1.1.1875|IM|infection-match|1|rt=Feb 01 2016 23:13:10 UTC src=1.1.1.1 cn3Label=cncPort cn3=80 cn2Label=sid cn2=84575103 shost= https://www.recordflow.biz proto=tcp spt=51997 dst=1.1.1.1 cs5Label=cncHost cs5=1.1.1.1 dvchost= USABLDRRECFLOW01dvc=1.1.1.1 smac=00:00:00:00:00:00 cn1Label=vlan cn1=0 dpt=80 externalId=609081 cs4Label=link cs4=THING dmac=00:00:00:00:00:00 cs1Label=sname cs1=Exploit.Kit.AnglerDIPv4

Dmac= in this log is the attacker MAC Address (origin).

  • Brocade Switch

03 01 2017 02:08:41 1.1.1.1 <LOC6:NOTE> Mar  1 02:08:38 USABLDRRECFLOW01dataplane[2287]: fw rule INTERNAL-IN:10000 block udp(17) src= USABLDRRECFLOW01/0:00:00:00:00:00/IPV6Address dst=/00:00:00:00/0000::0:0(547) len=159 hoplimit=1 len=119

Src= with hostname followed by origin MAC Address. Network traffic shown src->dst will be origin->impacted.

  • Windows Event Log – DHCP Ops

<Event xmlns='http://Host2/win/2004/08/events/event'><System><Provider Name='Microsoft-Windows-DHCP-Server' Guid='{6d64f02c-a125-4dac-9a01-f0555b41ca84}'/><EventID>20097</EventID><Version>0</Version><Level>Information</Level><Task>None</Task><Opcode>Info</Opcode><Keywords></Keywords><TimeCreated SystemTime='2014-10-07T00:13:02.116745100Z'/><EventRecordID>445336</EventRecordID><Correlation/><Execution ProcessID='1320' ThreadID='2952'/><Channel>Microsoft-Windows-Dhcp-Server/FilterNotifications</Channel><Computer> USABLDRRECFLOW01</Computer><Security UserID='NT AUTHORITY\NETWORK SERVICE'/></System><EventData>DHCP Services were denied to machine with hardware address 00-00-00-00-00-00, hardware type 1 and FQDN/Hostname USABLDRRECFLOW01because it did not match any entry in the Allow List.</EventData></Event>

Origin MAC Address with dashes instead of colons.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.