input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=192.168.2.253 1 1688652858.821660321 NORDC_MX400_1 l7_firewall src=80.144.218.63 dst=149.214.58.193 protocol=tcp sport=52632 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1688652858.821660321 NORDC_MX400_1 l7_firewall src=80.144.218.63 dst=149.214.58.193 protocol=tcp sport=52632 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 52632 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 80.144.218.63 serverIP: 149.214.58.193
Explain this syslog message
<134>Original Address=192.168.2.253 1 1688652858.821660321 NORDC_MX400_1 l7_firewall src=209.193.80.239 dst=168.74.18.150 protocol=tcp sport=52632 dport=443 decision=blocked
{ "action": "block", "clientport": 52632, "message": "<134>Original Address=192.168.2.253 1 1688652858.821660321 NORDC_MX400_1 l7_firewall src=209.193.80.239 dst=168.74.18.150 protocol=tcp sport=52632 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "209.193.80.239", "serverIP": "168.74.18.150" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1688652858.821660321 NORDC_MX400_1 l7_firewall src=209.193.80.239 dst=168.74.18.150 protocol=tcp sport=52632 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1688652858.821660321 NORDC_MX400_1 l7_firewall src=209.193.80.239 dst=168.74.18.150 protocol=tcp sport=52632 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 52632 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 209.193.80.239 serverIP: 168.74.18.150
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"93.246.90.37","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=93.246.90.37 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=93.246.90.37 ::: pipelineEntrypoint=dispatch
{ "emailsubject": "Invoice 65148-22374 from Sandiegoprivatebank Payroll", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-23T00:43:26.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "productids": [ 32, 0 ], "filename": "from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll", "severitycode": 2, "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatTime\":\"2022-12-23T00:42:34.000Z\",\"threat\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2022-12-23T00:43:26.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"Invoice 65148-22374 from Sandiegoprivatebank Payroll\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":19556,\"headerFrom\":\"Invoices <mike@h2-eco.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mike@h2-eco.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"pazzi@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb\",\"md5\":\"4e446711caee9c8dbda023d4ac0306dc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067\",\"md5\":\"ec92700e9dd452ac45503ce6e98f11a3\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attstarked\",\"sha256\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"md5\":\"15d4a43388af02eb8ed6407657ea2c78\",\"filename\":\"wire confirmation-thursday221026-242137 \u202e\u202e\u202efdp.htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"cedbf104-5c2e-03e8-9d31-93d9f05fef1c\",\"QID\":\"3mhagya1g7-1\",\"GUID\":\"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy\",\"sender\":\"mike@h2-eco.com\",\"recipient\":[\"pazzi@sandiegoprivatebank.net\"],\"senderIP\":\"93.246.90.37\",\"messageID\":\"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>\"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=93.246.90.37 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=93.246.90.37 ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "emailsendingserver": "212.227.126.131", "messagetype": "email_protection_event", "emailfrom": "mike@h2-eco.com", "sourceinfo": "unknown", "filehash": "<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>", "vendorcode": "blocked_message", "action": "block", "streamName": "proofpoint_protect", "serverIP": "93.246.90.37" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"93.246.90.37","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=93.246.90.37 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=93.246.90.37 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"93.246.90.37","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=93.246.90.37 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=93.246.90.37 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: emailsubject: Invoice 65148-22374 from Sandiegoprivatebank Payroll senderhost: localhost severitylabel: critical starttimeutc: 2022-12-23T00:43:26.000Z tags: ['proofpoint_protect', 'email_protection_event'] productids: [32, 0] filename: from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll severitycode: 2 sensitivity: normal emailsendingserver: 212.227.126.131 messagetype: email_protection_event emailfrom: mike@h2-eco.com sourceinfo: unknown filehash: <ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> vendorcode: blocked_message action: block streamName: proofpoint_protect serverIP: 93.246.90.37
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"29.155.238.2","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=29.155.238.2 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=29.155.238.2 ::: pipelineEntrypoint=dispatch
{ "emailsubject": "Invoice 65148-22374 from Sandiegoprivatebank Payroll", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-23T00:43:26.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "productids": [ 32, 0 ], "filename": "from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll", "severitycode": 2, "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatTime\":\"2022-12-23T00:42:34.000Z\",\"threat\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2022-12-23T00:43:26.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"Invoice 65148-22374 from Sandiegoprivatebank Payroll\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":19556,\"headerFrom\":\"Invoices <mike@h2-eco.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mike@h2-eco.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"pazzi@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb\",\"md5\":\"4e446711caee9c8dbda023d4ac0306dc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067\",\"md5\":\"ec92700e9dd452ac45503ce6e98f11a3\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attstarked\",\"sha256\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"md5\":\"15d4a43388af02eb8ed6407657ea2c78\",\"filename\":\"wire confirmation-thursday221026-242137 \u202e\u202e\u202efdp.htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"cedbf104-5c2e-03e8-9d31-93d9f05fef1c\",\"QID\":\"3mhagya1g7-1\",\"GUID\":\"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy\",\"sender\":\"mike@h2-eco.com\",\"recipient\":[\"pazzi@sandiegoprivatebank.net\"],\"senderIP\":\"29.155.238.2\",\"messageID\":\"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>\"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=29.155.238.2 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=29.155.238.2 ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "emailsendingserver": "212.227.126.131", "messagetype": "email_protection_event", "emailfrom": "mike@h2-eco.com", "sourceinfo": "unknown", "filehash": "<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>", "vendorcode": "blocked_message", "action": "block", "streamName": "proofpoint_protect", "serverIP": "29.155.238.2" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"29.155.238.2","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=29.155.238.2 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=29.155.238.2 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"29.155.238.2","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=29.155.238.2 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=29.155.238.2 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: emailsubject: Invoice 65148-22374 from Sandiegoprivatebank Payroll senderhost: localhost severitylabel: critical starttimeutc: 2022-12-23T00:43:26.000Z tags: ['proofpoint_protect', 'email_protection_event'] productids: [32, 0] filename: from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll severitycode: 2 sensitivity: normal emailsendingserver: 212.227.126.131 messagetype: email_protection_event emailfrom: mike@h2-eco.com sourceinfo: unknown filehash: <ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> vendorcode: blocked_message action: block streamName: proofpoint_protect serverIP: 29.155.238.2
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"211.174.43.194","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=211.174.43.194 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=211.174.43.194 ::: pipelineEntrypoint=dispatch
{ "emailsubject": "Invoice 65148-22374 from Sandiegoprivatebank Payroll", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-23T00:43:26.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "productids": [ 32, 0 ], "filename": "from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll", "severitycode": 2, "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatTime\":\"2022-12-23T00:42:34.000Z\",\"threat\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2022-12-23T00:43:26.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Invoice 65148-22374 from Sandiegoprivatebank Payroll\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":19556,\"headerFrom\":\"Invoices <mike@h2-eco.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mike@h2-eco.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"pazzi@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb\",\"md5\":\"4e446711caee9c8dbda023d4ac0306dc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067\",\"md5\":\"ec92700e9dd452ac45503ce6e98f11a3\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"md5\":\"15d4a43388af02eb8ed6407657ea2c78\",\"filename\":\"wire confirmation-thursday221026-242137 \u202e\u202e\u202efdp.htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"cedbf104-5c2e-03e8-9d31-93d9f05fef1c\",\"QID\":\"3mhagya1g7-1\",\"GUID\":\"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy\",\"sender\":\"mike@h2-eco.com\",\"recipient\":[\"pazzi@sandiegoprivatebank.net\"],\"senderIP\":\"211.174.43.194\",\"messageID\":\"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>\"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=211.174.43.194 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=211.174.43.194 ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "emailsendingserver": "212.227.126.131", "messagetype": "email_protection_event", "emailfrom": "mike@h2-eco.com", "sourceinfo": "unknown", "filehash": "<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>", "vendorcode": "blocked_message", "action": "block", "streamName": "proofpoint_protect", "serverIP": "211.174.43.194" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"211.174.43.194","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=211.174.43.194 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=211.174.43.194 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"211.174.43.194","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=211.174.43.194 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=211.174.43.194 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: emailsubject: Invoice 65148-22374 from Sandiegoprivatebank Payroll senderhost: localhost severitylabel: critical starttimeutc: 2022-12-23T00:43:26.000Z tags: ['proofpoint_protect', 'email_protection_event'] productids: [32, 0] filename: from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll severitycode: 2 sensitivity: normal emailsendingserver: 212.227.126.131 messagetype: email_protection_event emailfrom: mike@h2-eco.com sourceinfo: unknown filehash: <ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> vendorcode: blocked_message action: block streamName: proofpoint_protect serverIP: 211.174.43.194
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"202.216.10.228","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=202.216.10.228 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=202.216.10.228 ::: pipelineEntrypoint=dispatch
{ "emailsubject": "Invoice 65148-22374 from Sandiegoprivatebank Payroll", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-23T00:43:26.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "productids": [ 32, 0 ], "filename": "from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll", "severitycode": 2, "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatTime\":\"2022-12-23T00:42:34.000Z\",\"threat\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2022-12-23T00:43:26.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Invoice 65148-22374 from Sandiegoprivatebank Payroll\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":19556,\"headerFrom\":\"Invoices <mike@h2-eco.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mike@h2-eco.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"pazzi@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb\",\"md5\":\"4e446711caee9c8dbda023d4ac0306dc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067\",\"md5\":\"ec92700e9dd452ac45503ce6e98f11a3\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"md5\":\"15d4a43388af02eb8ed6407657ea2c78\",\"filename\":\"wire confirmation-thursday221026-242137 \u202e\u202e\u202efdp.htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"cedbf104-5c2e-03e8-9d31-93d9f05fef1c\",\"QID\":\"3mhagya1g7-1\",\"GUID\":\"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy\",\"sender\":\"mike@h2-eco.com\",\"recipient\":[\"pazzi@sandiegoprivatebank.net\"],\"senderIP\":\"202.216.10.228\",\"messageID\":\"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>\"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=202.216.10.228 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=202.216.10.228 ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "emailsendingserver": "212.227.126.131", "messagetype": "email_protection_event", "emailfrom": "mike@h2-eco.com", "sourceinfo": "unknown", "filehash": "<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>", "vendorcode": "blocked_message", "action": "block", "streamName": "proofpoint_protect", "serverIP": "202.216.10.228" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"202.216.10.228","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=202.216.10.228 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=202.216.10.228 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"202.216.10.228","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=202.216.10.228 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=202.216.10.228 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: emailsubject: Invoice 65148-22374 from Sandiegoprivatebank Payroll senderhost: localhost severitylabel: critical starttimeutc: 2022-12-23T00:43:26.000Z tags: ['proofpoint_protect', 'email_protection_event'] productids: [32, 0] filename: from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll severitycode: 2 sensitivity: normal emailsendingserver: 212.227.126.131 messagetype: email_protection_event emailfrom: mike@h2-eco.com sourceinfo: unknown filehash: <ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> vendorcode: blocked_message action: block streamName: proofpoint_protect serverIP: 202.216.10.228
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"213.33.34.41","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=213.33.34.41 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=213.33.34.41 ::: pipelineEntrypoint=dispatch
{ "emailsubject": "Invoice 65148-22374 from Sandiegoprivatebank Payroll", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-23T00:43:26.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "productids": [ 32, 0 ], "filename": "from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll", "severitycode": 2, "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatTime\":\"2022-12-23T00:42:34.000Z\",\"threat\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2022-12-23T00:43:26.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"Invoice 65148-22374 from Sandiegoprivatebank Payroll\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":19556,\"headerFrom\":\"Invoices <mike@h2-eco.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mike@h2-eco.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"pazzi@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb\",\"md5\":\"4e446711caee9c8dbda023d4ac0306dc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067\",\"md5\":\"ec92700e9dd452ac45503ce6e98f11a3\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attstarked\",\"sha256\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"md5\":\"15d4a43388af02eb8ed6407657ea2c78\",\"filename\":\"wire confirmation-thursday221026-242137 \u202e\u202e\u202efdp.htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"cedbf104-5c2e-03e8-9d31-93d9f05fef1c\",\"QID\":\"3mhagya1g7-1\",\"GUID\":\"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy\",\"sender\":\"mike@h2-eco.com\",\"recipient\":[\"pazzi@sandiegoprivatebank.net\"],\"senderIP\":\"213.33.34.41\",\"messageID\":\"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>\"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=213.33.34.41 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=213.33.34.41 ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "emailsendingserver": "212.227.126.131", "messagetype": "email_protection_event", "emailfrom": "mike@h2-eco.com", "sourceinfo": "unknown", "filehash": "<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>", "vendorcode": "blocked_message", "action": "block", "streamName": "proofpoint_protect", "serverIP": "213.33.34.41" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"213.33.34.41","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=213.33.34.41 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=213.33.34.41 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"213.33.34.41","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=213.33.34.41 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=213.33.34.41 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: emailsubject: Invoice 65148-22374 from Sandiegoprivatebank Payroll senderhost: localhost severitylabel: critical starttimeutc: 2022-12-23T00:43:26.000Z tags: ['proofpoint_protect', 'email_protection_event'] productids: [32, 0] filename: from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll severitycode: 2 sensitivity: normal emailsendingserver: 212.227.126.131 messagetype: email_protection_event emailfrom: mike@h2-eco.com sourceinfo: unknown filehash: <ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> vendorcode: blocked_message action: block streamName: proofpoint_protect serverIP: 213.33.34.41
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"72.111.16.190","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=72.111.16.190 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=72.111.16.190 ::: pipelineEntrypoint=dispatch
{ "emailsubject": "Invoice 65148-22374 from Sandiegoprivatebank Payroll", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-23T00:43:26.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "productids": [ 32, 0 ], "filename": "from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll", "severitycode": 2, "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatTime\":\"2022-12-23T00:42:34.000Z\",\"threat\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2022-12-23T00:43:26.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"Invoice 65148-22374 from Sandiegoprivatebank Payroll\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":19556,\"headerFrom\":\"Invoices <mike@h2-eco.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mike@h2-eco.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"pazzi@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb\",\"md5\":\"4e446711caee9c8dbda023d4ac0306dc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067\",\"md5\":\"ec92700e9dd452ac45503ce6e98f11a3\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attwayneed\",\"sha256\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"md5\":\"15d4a43388af02eb8ed6407657ea2c78\",\"filename\":\"wire confirmation-thursday221026-242137 \u202e\u202e\u202efdp.htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"cedbf104-5c2e-03e8-9d31-93d9f05fef1c\",\"QID\":\"3mhagya1g7-1\",\"GUID\":\"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy\",\"sender\":\"mike@h2-eco.com\",\"recipient\":[\"pazzi@sandiegoprivatebank.net\"],\"senderIP\":\"72.111.16.190\",\"messageID\":\"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>\"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=72.111.16.190 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=72.111.16.190 ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "emailsendingserver": "212.227.126.131", "messagetype": "email_protection_event", "emailfrom": "mike@h2-eco.com", "sourceinfo": "unknown", "filehash": "<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>", "vendorcode": "blocked_message", "action": "block", "streamName": "proofpoint_protect", "serverIP": "72.111.16.190" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"72.111.16.190","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=72.111.16.190 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=72.111.16.190 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"72.111.16.190","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=72.111.16.190 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=72.111.16.190 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: emailsubject: Invoice 65148-22374 from Sandiegoprivatebank Payroll senderhost: localhost severitylabel: critical starttimeutc: 2022-12-23T00:43:26.000Z tags: ['proofpoint_protect', 'email_protection_event'] productids: [32, 0] filename: from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll severitycode: 2 sensitivity: normal emailsendingserver: 212.227.126.131 messagetype: email_protection_event emailfrom: mike@h2-eco.com sourceinfo: unknown filehash: <ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> vendorcode: blocked_message action: block streamName: proofpoint_protect serverIP: 72.111.16.190
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"115.10.247.179","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=115.10.247.179 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=115.10.247.179 ::: pipelineEntrypoint=dispatch
{ "emailsubject": "Invoice 65148-22374 from Sandiegoprivatebank Payroll", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-23T00:43:26.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "productids": [ 32, 0 ], "filename": "from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll", "severitycode": 2, "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatTime\":\"2022-12-23T00:42:34.000Z\",\"threat\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"campaignID\":null,\"threatType\":\"attumbrellament\"}],\"messageTime\":\"2022-12-23T00:43:26.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"Invoice 65148-22374 from Sandiegoprivatebank Payroll\",\"quarantineFolder\":\"Attumbrellament Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":19556,\"headerFrom\":\"Invoices <mike@h2-eco.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mike@h2-eco.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"pazzi@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb\",\"md5\":\"4e446711caee9c8dbda023d4ac0306dc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067\",\"md5\":\"ec92700e9dd452ac45503ce6e98f11a3\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"md5\":\"15d4a43388af02eb8ed6407657ea2c78\",\"filename\":\"wire confirmation-thursday221026-242137 \u202e\u202e\u202efdp.htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"cedbf104-5c2e-03e8-9d31-93d9f05fef1c\",\"QID\":\"3mhagya1g7-1\",\"GUID\":\"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy\",\"sender\":\"mike@h2-eco.com\",\"recipient\":[\"pazzi@sandiegoprivatebank.net\"],\"senderIP\":\"115.10.247.179\",\"messageID\":\"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>\"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=115.10.247.179 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=115.10.247.179 ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "emailsendingserver": "212.227.126.131", "messagetype": "email_protection_event", "emailfrom": "mike@h2-eco.com", "sourceinfo": "unknown", "filehash": "<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>", "vendorcode": "blocked_message", "action": "block", "streamName": "proofpoint_protect", "serverIP": "115.10.247.179" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"115.10.247.179","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=115.10.247.179 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=115.10.247.179 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"115.10.247.179","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=115.10.247.179 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=115.10.247.179 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: emailsubject: Invoice 65148-22374 from Sandiegoprivatebank Payroll senderhost: localhost severitylabel: critical starttimeutc: 2022-12-23T00:43:26.000Z tags: ['proofpoint_protect', 'email_protection_event'] productids: [32, 0] filename: from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll severitycode: 2 sensitivity: normal emailsendingserver: 212.227.126.131 messagetype: email_protection_event emailfrom: mike@h2-eco.com sourceinfo: unknown filehash: <ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> vendorcode: blocked_message action: block streamName: proofpoint_protect serverIP: 115.10.247.179
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attacmement"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"121.1.128.11","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=121.1.128.11 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=121.1.128.11 ::: pipelineEntrypoint=dispatch
{ "emailsubject": "Invoice 65148-22374 from Sandiegoprivatebank Payroll", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-23T00:43:26.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "productids": [ 32, 0 ], "filename": "from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll", "severitycode": 2, "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatTime\":\"2022-12-23T00:42:34.000Z\",\"threat\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"campaignID\":null,\"threatType\":\"attacmement\"}],\"messageTime\":\"2022-12-23T00:43:26.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"Invoice 65148-22374 from Sandiegoprivatebank Payroll\",\"quarantineFolder\":\"Attacmement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":19556,\"headerFrom\":\"Invoices <mike@h2-eco.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mike@h2-eco.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"pazzi@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb\",\"md5\":\"4e446711caee9c8dbda023d4ac0306dc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067\",\"md5\":\"ec92700e9dd452ac45503ce6e98f11a3\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attacmeed\",\"sha256\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"md5\":\"15d4a43388af02eb8ed6407657ea2c78\",\"filename\":\"wire confirmation-thursday221026-242137 \u202e\u202e\u202efdp.htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"cedbf104-5c2e-03e8-9d31-93d9f05fef1c\",\"QID\":\"3mhagya1g7-1\",\"GUID\":\"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy\",\"sender\":\"mike@h2-eco.com\",\"recipient\":[\"pazzi@sandiegoprivatebank.net\"],\"senderIP\":\"121.1.128.11\",\"messageID\":\"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>\"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=121.1.128.11 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=121.1.128.11 ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "emailsendingserver": "212.227.126.131", "messagetype": "email_protection_event", "emailfrom": "mike@h2-eco.com", "sourceinfo": "unknown", "filehash": "<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>", "vendorcode": "blocked_message", "action": "block", "streamName": "proofpoint_protect", "serverIP": "121.1.128.11" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attacmement"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"121.1.128.11","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=121.1.128.11 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=121.1.128.11 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attacmement"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 ‮‮‮fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"121.1.128.11","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=121.1.128.11 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=121.1.128.11 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: emailsubject: Invoice 65148-22374 from Sandiegoprivatebank Payroll senderhost: localhost severitylabel: critical starttimeutc: 2022-12-23T00:43:26.000Z tags: ['proofpoint_protect', 'email_protection_event'] productids: [32, 0] filename: from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll severitycode: 2 sensitivity: normal emailsendingserver: 212.227.126.131 messagetype: email_protection_event emailfrom: mike@h2-eco.com sourceinfo: unknown filehash: <ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> vendorcode: blocked_message action: block streamName: proofpoint_protect serverIP: 121.1.128.11
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=226.93.9.244 dst=16.13.83.11 protocol=tcp sport=80 dport=19434 decision=blocked
{ "action": "block", "clientport": 19434, "message": "<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=226.93.9.244 dst=16.13.83.11 protocol=tcp sport=80 dport=19434 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 80, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "16.13.83.11", "serverIP": "226.93.9.244" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=226.93.9.244 dst=16.13.83.11 protocol=tcp sport=80 dport=19434 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=226.93.9.244 dst=16.13.83.11 protocol=tcp sport=80 dport=19434 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 19434 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 80 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 16.13.83.11 serverIP: 226.93.9.244
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=98.137.84.36 dst=113.14.122.229 protocol=tcp sport=80 dport=19434 decision=blocked
{ "action": "block", "clientport": 19434, "message": "<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=98.137.84.36 dst=113.14.122.229 protocol=tcp sport=80 dport=19434 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 80, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "113.14.122.229", "serverIP": "98.137.84.36" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=98.137.84.36 dst=113.14.122.229 protocol=tcp sport=80 dport=19434 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=98.137.84.36 dst=113.14.122.229 protocol=tcp sport=80 dport=19434 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 19434 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 80 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 113.14.122.229 serverIP: 98.137.84.36
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=7.97.17.195 dst=199.103.69.232 protocol=tcp sport=80 dport=19434 decision=blocked
{ "action": "block", "clientport": 19434, "message": "<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=7.97.17.195 dst=199.103.69.232 protocol=tcp sport=80 dport=19434 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 80, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "199.103.69.232", "serverIP": "7.97.17.195" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=7.97.17.195 dst=199.103.69.232 protocol=tcp sport=80 dport=19434 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=7.97.17.195 dst=199.103.69.232 protocol=tcp sport=80 dport=19434 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 19434 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 80 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 199.103.69.232 serverIP: 7.97.17.195
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=97.223.103.98 dst=133.155.147.64 protocol=tcp sport=80 dport=19434 decision=blocked
{ "action": "block", "clientport": 19434, "message": "<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=97.223.103.98 dst=133.155.147.64 protocol=tcp sport=80 dport=19434 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 80, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "133.155.147.64", "serverIP": "97.223.103.98" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=97.223.103.98 dst=133.155.147.64 protocol=tcp sport=80 dport=19434 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=97.223.103.98 dst=133.155.147.64 protocol=tcp sport=80 dport=19434 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 19434 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 80 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 133.155.147.64 serverIP: 97.223.103.98
Explain this syslog message
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=220.191.134.168 dst=67.111.250.154 protocol=tcp sport=59650 dport=443 decision=blocked
{ "action": "block", "clientport": 59650, "message": "<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=220.191.134.168 dst=67.111.250.154 protocol=tcp sport=59650 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "220.191.134.168", "serverIP": "67.111.250.154" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=220.191.134.168 dst=67.111.250.154 protocol=tcp sport=59650 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=220.191.134.168 dst=67.111.250.154 protocol=tcp sport=59650 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 59650 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 220.191.134.168 serverIP: 67.111.250.154
Explain this syslog message
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=159.95.59.225 dst=129.250.104.249 protocol=tcp sport=59650 dport=443 decision=blocked
{ "action": "block", "clientport": 59650, "message": "<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=159.95.59.225 dst=129.250.104.249 protocol=tcp sport=59650 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "159.95.59.225", "serverIP": "129.250.104.249" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=159.95.59.225 dst=129.250.104.249 protocol=tcp sport=59650 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=159.95.59.225 dst=129.250.104.249 protocol=tcp sport=59650 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 59650 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 159.95.59.225 serverIP: 129.250.104.249
Explain this syslog message
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=48.233.168.86 dst=11.21.71.99 protocol=tcp sport=59650 dport=443 decision=blocked
{ "action": "block", "clientport": 59650, "message": "<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=48.233.168.86 dst=11.21.71.99 protocol=tcp sport=59650 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "48.233.168.86", "serverIP": "11.21.71.99" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=48.233.168.86 dst=11.21.71.99 protocol=tcp sport=59650 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=48.233.168.86 dst=11.21.71.99 protocol=tcp sport=59650 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 59650 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 48.233.168.86 serverIP: 11.21.71.99
Explain this syslog message
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=96.204.226.156 dst=152.68.153.254 protocol=tcp sport=59650 dport=443 decision=blocked
{ "action": "block", "clientport": 59650, "message": "<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=96.204.226.156 dst=152.68.153.254 protocol=tcp sport=59650 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "96.204.226.156", "serverIP": "152.68.153.254" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=96.204.226.156 dst=152.68.153.254 protocol=tcp sport=59650 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=96.204.226.156 dst=152.68.153.254 protocol=tcp sport=59650 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 59650 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 96.204.226.156 serverIP: 152.68.153.254
Explain this syslog message
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=90.238.78.200 dst=207.62.105.146 protocol=tcp sport=65302 dport=443 decision=blocked
{ "action": "block", "clientport": 65302, "message": "<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=90.238.78.200 dst=207.62.105.146 protocol=tcp sport=65302 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "90.238.78.200", "serverIP": "207.62.105.146" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=90.238.78.200 dst=207.62.105.146 protocol=tcp sport=65302 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=90.238.78.200 dst=207.62.105.146 protocol=tcp sport=65302 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 65302 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 90.238.78.200 serverIP: 207.62.105.146
Explain this syslog message
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=58.117.248.217 dst=250.53.74.191 protocol=tcp sport=65302 dport=443 decision=blocked
{ "action": "block", "clientport": 65302, "message": "<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=58.117.248.217 dst=250.53.74.191 protocol=tcp sport=65302 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "58.117.248.217", "serverIP": "250.53.74.191" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=58.117.248.217 dst=250.53.74.191 protocol=tcp sport=65302 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=58.117.248.217 dst=250.53.74.191 protocol=tcp sport=65302 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 65302 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 58.117.248.217 serverIP: 250.53.74.191
Explain this syslog message
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=121.241.97.203 dst=50.222.36.249 protocol=tcp sport=65302 dport=443 decision=blocked
{ "action": "block", "clientport": 65302, "message": "<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=121.241.97.203 dst=50.222.36.249 protocol=tcp sport=65302 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "121.241.97.203", "serverIP": "50.222.36.249" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=121.241.97.203 dst=50.222.36.249 protocol=tcp sport=65302 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=121.241.97.203 dst=50.222.36.249 protocol=tcp sport=65302 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 65302 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 121.241.97.203 serverIP: 50.222.36.249
Explain this syslog message
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=44.121.39.223 dst=202.34.92.120 protocol=tcp sport=65302 dport=443 decision=blocked
{ "action": "block", "clientport": 65302, "message": "<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=44.121.39.223 dst=202.34.92.120 protocol=tcp sport=65302 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "44.121.39.223", "serverIP": "202.34.92.120" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=44.121.39.223 dst=202.34.92.120 protocol=tcp sport=65302 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=44.121.39.223 dst=202.34.92.120 protocol=tcp sport=65302 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 65302 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 44.121.39.223 serverIP: 202.34.92.120
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-09-30T10:29:02.060Z","agent":{"ephemeral_id":"36976287-4fe3-40b9-a82f-3692c2392d77","id":"6846763b-21b7-49f0-ab99-104d7b3b0a78","name":"ADAudit1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-09-30T10:29:03.649Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"ADAudit1.oscorp.org"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tOSCORP\n\tLogon ID:\t\t0xA8AA552\n\nPrivileges:\t\tSeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"OSCORP (oscorp.oscorpcloud.com)","senderHost":"ADAudit1.oscorp.org","sensitivity":"normal","winlog":{"activity_id":"{2692d4fa-34c2-4626-bb80-c9fc33265209}","api":"wineventlog","channel":"Security","computer_name":"ADAudit1.oscorp.org","event_data":{"PrivilegeList":"SeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"OSCORP","SubjectLogonId":"0xa8aa552","SubjectUserName":"johndoe","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":712,"thread":{"id":756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":5016542,"task":"Special Logon"}}
{ "senderhost": "ADAudit1.uwca.org", "severitylabel": "Info", "tags": [ "v8", "eventId:4672", "microsoft-windows-security-auditing", "security_privilege_change" ], "productids": [ 43 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2022-09-30T10:29:02.060Z\",\"agent\":{\"ephemeral_id\":\"36976287-4fe3-40b9-a82f-3692c2392d77\",\"id\":\"6846763b-21b7-49f0-ab99-104d7b3b0a78\",\"name\":\"ADAudit1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Special Logon\",\"code\":\"4672\",\"created\":\"2022-09-30T10:29:03.649Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"ADAudit1.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"Special privileges assigned to new logon.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tOSCORP\\n\\tLogon ID:\\t\\t0xA8AA552\\n\\nPrivileges:\\t\\tSeSecurityPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\",\"organization\":\"OSCORP (oscorp.oscorpcloud.com)\",\"senderHost\":\"ADAudit1.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{2692d4fa-34c2-4626-bb80-c9fc33265209}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"ADAudit1.oscorp.org\",\"event_data\":{\"PrivilegeList\":\"SeSecurityPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\",\"SubjectDomainName\":\"OSCORP\",\"SubjectLogonId\":\"0xa8aa552\",\"SubjectUserName\":\"johndoe\",\"SubjectUserSid\":\"S-1-5-18\"},\"event_id\":\"4672\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":712,\"thread\":{\"id\":756}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":5016542,\"task\":\"Special Logon\"}}", "sensitivity": "normal", "messagetype": "security_privilege_change", "vendorcode": "5016542", "action": "Special Logon", "streamName": "microsoft-windows-security-auditing", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-09-30T10:29:02.060Z","agent":{"ephemeral_id":"36976287-4fe3-40b9-a82f-3692c2392d77","id":"6846763b-21b7-49f0-ab99-104d7b3b0a78","name":"ADAudit1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-09-30T10:29:03.649Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"ADAudit1.oscorp.org"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tOSCORP\n\tLogon ID:\t\t0xA8AA552\n\nPrivileges:\t\tSeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"OSCORP (oscorp.oscorpcloud.com)","senderHost":"ADAudit1.oscorp.org","sensitivity":"normal","winlog":{"activity_id":"{2692d4fa-34c2-4626-bb80-c9fc33265209}","api":"wineventlog","channel":"Security","computer_name":"ADAudit1.oscorp.org","event_data":{"PrivilegeList":"SeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"OSCORP","SubjectLogonId":"0xa8aa552","SubjectUserName":"johndoe","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":712,"thread":{"id":756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":5016542,"task":"Special Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-09-30T10:29:02.060Z","agent":{"ephemeral_id":"36976287-4fe3-40b9-a82f-3692c2392d77","id":"6846763b-21b7-49f0-ab99-104d7b3b0a78","name":"ADAudit1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-09-30T10:29:03.649Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"ADAudit1.oscorp.org"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tOSCORP\n\tLogon ID:\t\t0xA8AA552\n\nPrivileges:\t\tSeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"OSCORP (oscorp.oscorpcloud.com)","senderHost":"ADAudit1.oscorp.org","sensitivity":"normal","winlog":{"activity_id":"{2692d4fa-34c2-4626-bb80-c9fc33265209}","api":"wineventlog","channel":"Security","computer_name":"ADAudit1.oscorp.org","event_data":{"PrivilegeList":"SeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"OSCORP","SubjectLogonId":"0xa8aa552","SubjectUserName":"johndoe","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":712,"thread":{"id":756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":5016542,"task":"Special Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: ADAudit1.uwca.org severitylabel: Info tags: ['v8', 'eventId:4672', 'microsoft-windows-security-auditing', 'security_privilege_change'] productids: [43] sourceinfo: unknown sensitivity: normal messagetype: security_privilege_change vendorcode: 5016542 action: Special Logon streamName: microsoft-windows-security-auditing userName: johndoe
Explain this syslog message
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=19.80.100.211 dst=13.232.135.33 protocol=udp sport=57079 dport=32475 decision=blocked
{ "action": "block", "clientport": 57079, "message": "<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=19.80.100.211 dst=13.232.135.33 protocol=udp sport=57079 dport=32475 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 32475, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "19.80.100.211", "serverIP": "13.232.135.33" }
Create a JSON artifact from the message
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=19.80.100.211 dst=13.232.135.33 protocol=udp sport=57079 dport=32475 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=19.80.100.211 dst=13.232.135.33 protocol=udp sport=57079 dport=32475 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57079 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 32475 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 19.80.100.211 serverIP: 13.232.135.33
Explain this syslog message
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=18.87.105.77 dst=194.138.193.74 protocol=udp sport=57079 dport=32475 decision=blocked
{ "action": "block", "clientport": 57079, "message": "<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=18.87.105.77 dst=194.138.193.74 protocol=udp sport=57079 dport=32475 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 32475, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "18.87.105.77", "serverIP": "194.138.193.74" }
Create a JSON artifact from the message
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=18.87.105.77 dst=194.138.193.74 protocol=udp sport=57079 dport=32475 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=18.87.105.77 dst=194.138.193.74 protocol=udp sport=57079 dport=32475 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57079 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 32475 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 18.87.105.77 serverIP: 194.138.193.74
Explain this syslog message
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=174.124.231.231 dst=164.19.215.205 protocol=udp sport=57079 dport=32475 decision=blocked
{ "action": "block", "clientport": 57079, "message": "<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=174.124.231.231 dst=164.19.215.205 protocol=udp sport=57079 dport=32475 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 32475, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "174.124.231.231", "serverIP": "164.19.215.205" }
Create a JSON artifact from the message
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=174.124.231.231 dst=164.19.215.205 protocol=udp sport=57079 dport=32475 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=174.124.231.231 dst=164.19.215.205 protocol=udp sport=57079 dport=32475 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57079 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 32475 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 174.124.231.231 serverIP: 164.19.215.205
Explain this syslog message
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=57.89.78.166 dst=114.79.121.82 protocol=udp sport=57079 dport=32475 decision=blocked
{ "action": "block", "clientport": 57079, "message": "<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=57.89.78.166 dst=114.79.121.82 protocol=udp sport=57079 dport=32475 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 32475, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "57.89.78.166", "serverIP": "114.79.121.82" }
Create a JSON artifact from the message
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=57.89.78.166 dst=114.79.121.82 protocol=udp sport=57079 dport=32475 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=57.89.78.166 dst=114.79.121.82 protocol=udp sport=57079 dport=32475 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57079 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 32475 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 57.89.78.166 serverIP: 114.79.121.82
Explain this syslog message
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=213.80.20.115 dst=232.24.18.245 protocol=tcp sport=63878 dport=443 decision=blocked
{ "action": "block", "clientport": 63878, "message": "<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=213.80.20.115 dst=232.24.18.245 protocol=tcp sport=63878 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "213.80.20.115", "serverIP": "232.24.18.245" }
Create a JSON artifact from the message
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=213.80.20.115 dst=232.24.18.245 protocol=tcp sport=63878 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=213.80.20.115 dst=232.24.18.245 protocol=tcp sport=63878 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 63878 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 213.80.20.115 serverIP: 232.24.18.245
Explain this syslog message
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=113.192.60.31 dst=210.27.19.245 protocol=tcp sport=63878 dport=443 decision=blocked
{ "action": "block", "clientport": 63878, "message": "<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=113.192.60.31 dst=210.27.19.245 protocol=tcp sport=63878 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "113.192.60.31", "serverIP": "210.27.19.245" }
Create a JSON artifact from the message
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=113.192.60.31 dst=210.27.19.245 protocol=tcp sport=63878 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=113.192.60.31 dst=210.27.19.245 protocol=tcp sport=63878 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 63878 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 113.192.60.31 serverIP: 210.27.19.245
Explain this syslog message
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=163.154.72.69 dst=231.227.101.68 protocol=tcp sport=63878 dport=443 decision=blocked
{ "action": "block", "clientport": 63878, "message": "<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=163.154.72.69 dst=231.227.101.68 protocol=tcp sport=63878 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "163.154.72.69", "serverIP": "231.227.101.68" }
Create a JSON artifact from the message
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=163.154.72.69 dst=231.227.101.68 protocol=tcp sport=63878 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=163.154.72.69 dst=231.227.101.68 protocol=tcp sport=63878 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 63878 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 163.154.72.69 serverIP: 231.227.101.68
Explain this syslog message
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=72.175.98.137 dst=169.16.184.11 protocol=tcp sport=63878 dport=443 decision=blocked
{ "action": "block", "clientport": 63878, "message": "<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=72.175.98.137 dst=169.16.184.11 protocol=tcp sport=63878 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "72.175.98.137", "serverIP": "169.16.184.11" }
Create a JSON artifact from the message
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=72.175.98.137 dst=169.16.184.11 protocol=tcp sport=63878 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=72.175.98.137 dst=169.16.184.11 protocol=tcp sport=63878 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 63878 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 72.175.98.137 serverIP: 169.16.184.11
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=251.255.214.119 dst=199.99.114.200 protocol=tcp sport=57924 dport=443 decision=blocked
{ "action": "block", "clientport": 57924, "message": "<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=251.255.214.119 dst=199.99.114.200 protocol=tcp sport=57924 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "251.255.214.119", "serverIP": "199.99.114.200" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=251.255.214.119 dst=199.99.114.200 protocol=tcp sport=57924 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=251.255.214.119 dst=199.99.114.200 protocol=tcp sport=57924 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57924 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 251.255.214.119 serverIP: 199.99.114.200
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=199.104.1.127 dst=221.194.24.184 protocol=tcp sport=57924 dport=443 decision=blocked
{ "action": "block", "clientport": 57924, "message": "<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=199.104.1.127 dst=221.194.24.184 protocol=tcp sport=57924 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "199.104.1.127", "serverIP": "221.194.24.184" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=199.104.1.127 dst=221.194.24.184 protocol=tcp sport=57924 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=199.104.1.127 dst=221.194.24.184 protocol=tcp sport=57924 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57924 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 199.104.1.127 serverIP: 221.194.24.184
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=77.121.246.22 dst=101.18.247.101 protocol=tcp sport=57924 dport=443 decision=blocked
{ "action": "block", "clientport": 57924, "message": "<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=77.121.246.22 dst=101.18.247.101 protocol=tcp sport=57924 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "77.121.246.22", "serverIP": "101.18.247.101" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=77.121.246.22 dst=101.18.247.101 protocol=tcp sport=57924 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message