input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<134>Original Address=192.168.2.253 1 1688652858.821660321 NORDC_MX400_1 l7_firewall src=80.144.218.63 dst=149.214.58.193 protocol=tcp sport=52632 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688652858.821660321 NORDC_MX400_1 l7_firewall src=80.144.218.63 dst=149.214.58.193 protocol=tcp sport=52632 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52632
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 80.144.218.63
serverIP: 149.214.58.193 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688652858.821660321 NORDC_MX400_1 l7_firewall src=209.193.80.239 dst=168.74.18.150 protocol=tcp sport=52632 dport=443 decision=blocked | {
"action": "block",
"clientport": 52632,
"message": "<134>Original Address=192.168.2.253 1 1688652858.821660321 NORDC_MX400_1 l7_firewall src=209.193.80.239 dst=168.74.18.150 protocol=tcp sport=52632 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "209.193.80.239",
"serverIP": "168.74.18.150"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688652858.821660321 NORDC_MX400_1 l7_firewall src=209.193.80.239 dst=168.74.18.150 protocol=tcp sport=52632 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688652858.821660321 NORDC_MX400_1 l7_firewall src=209.193.80.239 dst=168.74.18.150 protocol=tcp sport=52632 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52632
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 209.193.80.239
serverIP: 168.74.18.150 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"93.246.90.37","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=93.246.90.37 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=93.246.90.37 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "Invoice 65148-22374 from Sandiegoprivatebank Payroll",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-23T00:43:26.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatTime\":\"2022-12-23T00:42:34.000Z\",\"threat\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2022-12-23T00:43:26.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"Invoice 65148-22374 from Sandiegoprivatebank Payroll\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":19556,\"headerFrom\":\"Invoices <mike@h2-eco.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mike@h2-eco.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"pazzi@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb\",\"md5\":\"4e446711caee9c8dbda023d4ac0306dc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067\",\"md5\":\"ec92700e9dd452ac45503ce6e98f11a3\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attstarked\",\"sha256\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"md5\":\"15d4a43388af02eb8ed6407657ea2c78\",\"filename\":\"wire confirmation-thursday221026-242137 \u202e\u202e\u202efdp.htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"cedbf104-5c2e-03e8-9d31-93d9f05fef1c\",\"QID\":\"3mhagya1g7-1\",\"GUID\":\"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy\",\"sender\":\"mike@h2-eco.com\",\"recipient\":[\"pazzi@sandiegoprivatebank.net\"],\"senderIP\":\"93.246.90.37\",\"messageID\":\"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>\"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=93.246.90.37 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=93.246.90.37 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "212.227.126.131",
"messagetype": "email_protection_event",
"emailfrom": "mike@h2-eco.com",
"sourceinfo": "unknown",
"filehash": "<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "93.246.90.37"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"93.246.90.37","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=93.246.90.37 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=93.246.90.37 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"93.246.90.37","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=93.246.90.37 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=93.246.90.37 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: Invoice 65148-22374 from Sandiegoprivatebank Payroll
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-23T00:43:26.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll
severitycode: 2
sensitivity: normal
emailsendingserver: 212.227.126.131
messagetype: email_protection_event
emailfrom: mike@h2-eco.com
sourceinfo: unknown
filehash: <ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 93.246.90.37 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"29.155.238.2","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=29.155.238.2 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=29.155.238.2 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "Invoice 65148-22374 from Sandiegoprivatebank Payroll",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-23T00:43:26.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatTime\":\"2022-12-23T00:42:34.000Z\",\"threat\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2022-12-23T00:43:26.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"Invoice 65148-22374 from Sandiegoprivatebank Payroll\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":19556,\"headerFrom\":\"Invoices <mike@h2-eco.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mike@h2-eco.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"pazzi@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb\",\"md5\":\"4e446711caee9c8dbda023d4ac0306dc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067\",\"md5\":\"ec92700e9dd452ac45503ce6e98f11a3\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attstarked\",\"sha256\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"md5\":\"15d4a43388af02eb8ed6407657ea2c78\",\"filename\":\"wire confirmation-thursday221026-242137 \u202e\u202e\u202efdp.htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"cedbf104-5c2e-03e8-9d31-93d9f05fef1c\",\"QID\":\"3mhagya1g7-1\",\"GUID\":\"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy\",\"sender\":\"mike@h2-eco.com\",\"recipient\":[\"pazzi@sandiegoprivatebank.net\"],\"senderIP\":\"29.155.238.2\",\"messageID\":\"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>\"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=29.155.238.2 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=29.155.238.2 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "212.227.126.131",
"messagetype": "email_protection_event",
"emailfrom": "mike@h2-eco.com",
"sourceinfo": "unknown",
"filehash": "<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "29.155.238.2"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"29.155.238.2","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=29.155.238.2 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=29.155.238.2 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"29.155.238.2","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=29.155.238.2 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=29.155.238.2 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: Invoice 65148-22374 from Sandiegoprivatebank Payroll
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-23T00:43:26.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll
severitycode: 2
sensitivity: normal
emailsendingserver: 212.227.126.131
messagetype: email_protection_event
emailfrom: mike@h2-eco.com
sourceinfo: unknown
filehash: <ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 29.155.238.2 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"211.174.43.194","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=211.174.43.194 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=211.174.43.194 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "Invoice 65148-22374 from Sandiegoprivatebank Payroll",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-23T00:43:26.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatTime\":\"2022-12-23T00:42:34.000Z\",\"threat\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2022-12-23T00:43:26.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Invoice 65148-22374 from Sandiegoprivatebank Payroll\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":19556,\"headerFrom\":\"Invoices <mike@h2-eco.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mike@h2-eco.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"pazzi@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb\",\"md5\":\"4e446711caee9c8dbda023d4ac0306dc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067\",\"md5\":\"ec92700e9dd452ac45503ce6e98f11a3\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"md5\":\"15d4a43388af02eb8ed6407657ea2c78\",\"filename\":\"wire confirmation-thursday221026-242137 \u202e\u202e\u202efdp.htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"cedbf104-5c2e-03e8-9d31-93d9f05fef1c\",\"QID\":\"3mhagya1g7-1\",\"GUID\":\"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy\",\"sender\":\"mike@h2-eco.com\",\"recipient\":[\"pazzi@sandiegoprivatebank.net\"],\"senderIP\":\"211.174.43.194\",\"messageID\":\"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>\"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=211.174.43.194 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=211.174.43.194 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "212.227.126.131",
"messagetype": "email_protection_event",
"emailfrom": "mike@h2-eco.com",
"sourceinfo": "unknown",
"filehash": "<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "211.174.43.194"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"211.174.43.194","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=211.174.43.194 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=211.174.43.194 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"211.174.43.194","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=211.174.43.194 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=211.174.43.194 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: Invoice 65148-22374 from Sandiegoprivatebank Payroll
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-23T00:43:26.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll
severitycode: 2
sensitivity: normal
emailsendingserver: 212.227.126.131
messagetype: email_protection_event
emailfrom: mike@h2-eco.com
sourceinfo: unknown
filehash: <ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 211.174.43.194 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"202.216.10.228","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=202.216.10.228 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=202.216.10.228 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "Invoice 65148-22374 from Sandiegoprivatebank Payroll",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-23T00:43:26.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatTime\":\"2022-12-23T00:42:34.000Z\",\"threat\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2022-12-23T00:43:26.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Invoice 65148-22374 from Sandiegoprivatebank Payroll\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":19556,\"headerFrom\":\"Invoices <mike@h2-eco.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mike@h2-eco.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"pazzi@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb\",\"md5\":\"4e446711caee9c8dbda023d4ac0306dc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067\",\"md5\":\"ec92700e9dd452ac45503ce6e98f11a3\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"md5\":\"15d4a43388af02eb8ed6407657ea2c78\",\"filename\":\"wire confirmation-thursday221026-242137 \u202e\u202e\u202efdp.htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"cedbf104-5c2e-03e8-9d31-93d9f05fef1c\",\"QID\":\"3mhagya1g7-1\",\"GUID\":\"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy\",\"sender\":\"mike@h2-eco.com\",\"recipient\":[\"pazzi@sandiegoprivatebank.net\"],\"senderIP\":\"202.216.10.228\",\"messageID\":\"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>\"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=202.216.10.228 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=202.216.10.228 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "212.227.126.131",
"messagetype": "email_protection_event",
"emailfrom": "mike@h2-eco.com",
"sourceinfo": "unknown",
"filehash": "<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "202.216.10.228"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"202.216.10.228","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=202.216.10.228 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=202.216.10.228 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"202.216.10.228","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=202.216.10.228 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=202.216.10.228 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: Invoice 65148-22374 from Sandiegoprivatebank Payroll
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-23T00:43:26.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll
severitycode: 2
sensitivity: normal
emailsendingserver: 212.227.126.131
messagetype: email_protection_event
emailfrom: mike@h2-eco.com
sourceinfo: unknown
filehash: <ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 202.216.10.228 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"213.33.34.41","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=213.33.34.41 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=213.33.34.41 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "Invoice 65148-22374 from Sandiegoprivatebank Payroll",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-23T00:43:26.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatTime\":\"2022-12-23T00:42:34.000Z\",\"threat\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2022-12-23T00:43:26.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"Invoice 65148-22374 from Sandiegoprivatebank Payroll\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":19556,\"headerFrom\":\"Invoices <mike@h2-eco.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mike@h2-eco.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"pazzi@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb\",\"md5\":\"4e446711caee9c8dbda023d4ac0306dc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067\",\"md5\":\"ec92700e9dd452ac45503ce6e98f11a3\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attstarked\",\"sha256\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"md5\":\"15d4a43388af02eb8ed6407657ea2c78\",\"filename\":\"wire confirmation-thursday221026-242137 \u202e\u202e\u202efdp.htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"cedbf104-5c2e-03e8-9d31-93d9f05fef1c\",\"QID\":\"3mhagya1g7-1\",\"GUID\":\"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy\",\"sender\":\"mike@h2-eco.com\",\"recipient\":[\"pazzi@sandiegoprivatebank.net\"],\"senderIP\":\"213.33.34.41\",\"messageID\":\"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>\"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=213.33.34.41 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=213.33.34.41 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "212.227.126.131",
"messagetype": "email_protection_event",
"emailfrom": "mike@h2-eco.com",
"sourceinfo": "unknown",
"filehash": "<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "213.33.34.41"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"213.33.34.41","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=213.33.34.41 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=213.33.34.41 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"213.33.34.41","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=213.33.34.41 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=213.33.34.41 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: Invoice 65148-22374 from Sandiegoprivatebank Payroll
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-23T00:43:26.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll
severitycode: 2
sensitivity: normal
emailsendingserver: 212.227.126.131
messagetype: email_protection_event
emailfrom: mike@h2-eco.com
sourceinfo: unknown
filehash: <ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 213.33.34.41 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"72.111.16.190","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=72.111.16.190 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=72.111.16.190 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "Invoice 65148-22374 from Sandiegoprivatebank Payroll",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-23T00:43:26.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatTime\":\"2022-12-23T00:42:34.000Z\",\"threat\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2022-12-23T00:43:26.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"Invoice 65148-22374 from Sandiegoprivatebank Payroll\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":19556,\"headerFrom\":\"Invoices <mike@h2-eco.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mike@h2-eco.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"pazzi@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb\",\"md5\":\"4e446711caee9c8dbda023d4ac0306dc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067\",\"md5\":\"ec92700e9dd452ac45503ce6e98f11a3\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attwayneed\",\"sha256\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"md5\":\"15d4a43388af02eb8ed6407657ea2c78\",\"filename\":\"wire confirmation-thursday221026-242137 \u202e\u202e\u202efdp.htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"cedbf104-5c2e-03e8-9d31-93d9f05fef1c\",\"QID\":\"3mhagya1g7-1\",\"GUID\":\"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy\",\"sender\":\"mike@h2-eco.com\",\"recipient\":[\"pazzi@sandiegoprivatebank.net\"],\"senderIP\":\"72.111.16.190\",\"messageID\":\"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>\"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=72.111.16.190 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=72.111.16.190 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "212.227.126.131",
"messagetype": "email_protection_event",
"emailfrom": "mike@h2-eco.com",
"sourceinfo": "unknown",
"filehash": "<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "72.111.16.190"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"72.111.16.190","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=72.111.16.190 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=72.111.16.190 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"72.111.16.190","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=72.111.16.190 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=72.111.16.190 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: Invoice 65148-22374 from Sandiegoprivatebank Payroll
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-23T00:43:26.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll
severitycode: 2
sensitivity: normal
emailsendingserver: 212.227.126.131
messagetype: email_protection_event
emailfrom: mike@h2-eco.com
sourceinfo: unknown
filehash: <ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 72.111.16.190 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"115.10.247.179","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=115.10.247.179 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=115.10.247.179 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "Invoice 65148-22374 from Sandiegoprivatebank Payroll",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-23T00:43:26.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatTime\":\"2022-12-23T00:42:34.000Z\",\"threat\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"campaignID\":null,\"threatType\":\"attumbrellament\"}],\"messageTime\":\"2022-12-23T00:43:26.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"Invoice 65148-22374 from Sandiegoprivatebank Payroll\",\"quarantineFolder\":\"Attumbrellament Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":19556,\"headerFrom\":\"Invoices <mike@h2-eco.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mike@h2-eco.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"pazzi@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb\",\"md5\":\"4e446711caee9c8dbda023d4ac0306dc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067\",\"md5\":\"ec92700e9dd452ac45503ce6e98f11a3\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"md5\":\"15d4a43388af02eb8ed6407657ea2c78\",\"filename\":\"wire confirmation-thursday221026-242137 \u202e\u202e\u202efdp.htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"cedbf104-5c2e-03e8-9d31-93d9f05fef1c\",\"QID\":\"3mhagya1g7-1\",\"GUID\":\"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy\",\"sender\":\"mike@h2-eco.com\",\"recipient\":[\"pazzi@sandiegoprivatebank.net\"],\"senderIP\":\"115.10.247.179\",\"messageID\":\"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>\"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=115.10.247.179 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=115.10.247.179 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "212.227.126.131",
"messagetype": "email_protection_event",
"emailfrom": "mike@h2-eco.com",
"sourceinfo": "unknown",
"filehash": "<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "115.10.247.179"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"115.10.247.179","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=115.10.247.179 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=115.10.247.179 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"115.10.247.179","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=115.10.247.179 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=115.10.247.179 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: Invoice 65148-22374 from Sandiegoprivatebank Payroll
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-23T00:43:26.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll
severitycode: 2
sensitivity: normal
emailsendingserver: 212.227.126.131
messagetype: email_protection_event
emailfrom: mike@h2-eco.com
sourceinfo: unknown
filehash: <ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 115.10.247.179 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attacmement"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"121.1.128.11","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=121.1.128.11 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=121.1.128.11 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "Invoice 65148-22374 from Sandiegoprivatebank Payroll",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-23T00:43:26.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"threatTime\":\"2022-12-23T00:42:34.000Z\",\"threat\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"campaignID\":null,\"threatType\":\"attacmement\"}],\"messageTime\":\"2022-12-23T00:43:26.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"Invoice 65148-22374 from Sandiegoprivatebank Payroll\",\"quarantineFolder\":\"Attacmement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":19556,\"headerFrom\":\"Invoices <mike@h2-eco.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"mike@h2-eco.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"pazzi@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb\",\"md5\":\"4e446711caee9c8dbda023d4ac0306dc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067\",\"md5\":\"ec92700e9dd452ac45503ce6e98f11a3\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attacmeed\",\"sha256\":\"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc\",\"md5\":\"15d4a43388af02eb8ed6407657ea2c78\",\"filename\":\"wire confirmation-thursday221026-242137 \u202e\u202e\u202efdp.htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"cedbf104-5c2e-03e8-9d31-93d9f05fef1c\",\"QID\":\"3mhagya1g7-1\",\"GUID\":\"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy\",\"sender\":\"mike@h2-eco.com\",\"recipient\":[\"pazzi@sandiegoprivatebank.net\"],\"senderIP\":\"121.1.128.11\",\"messageID\":\"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>\"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=121.1.128.11 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=121.1.128.11 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "212.227.126.131",
"messagetype": "email_protection_event",
"emailfrom": "mike@h2-eco.com",
"sourceinfo": "unknown",
"filehash": "<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "121.1.128.11"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attacmement"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"121.1.128.11","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=121.1.128.11 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=121.1.128.11 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":0,"threatsInfoMap":[{"threatID":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","threatTime":"2022-12-23T00:42:34.000Z","threat":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","campaignID":null,"threatType":"attacmement"}],"messageTime":"2022-12-23T00:43:26.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Invoice 65148-22374 from Sandiegoprivatebank Payroll","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":19556,"headerFrom":"Invoices <mike@h2-eco.com>","headerReplyTo":null,"fromAddress":["mike@h2-eco.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["pazzi@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"603f79620465b42be108dcaa0972d8e3e6f0a7ba5bb3c84d1407cb5713fa51fb","md5":"4e446711caee9c8dbda023d4ac0306dc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"688787fbb991b11b4e767d01c6da762e35a9aa8fdf3b2e74bf44d658f04c3067","md5":"ec92700e9dd452ac45503ce6e98f11a3","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"cf02c3d1291a2cb83d6c9574deb1c283bdadb6566466d5c3d562cf51b13f49fc","md5":"15d4a43388af02eb8ed6407657ea2c78","filename":"wire confirmation-thursday221026-242137 fdp.htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"cedbf104-5c2e-03e8-9d31-93d9f05fef1c","QID":"3mhagya1g7-1","GUID":"rD_ncbBy8ikO0B_yIWrWl1n5rjXxlCdy","sender":"mike@h2-eco.com","recipient":["pazzi@sandiegoprivatebank.net"],"senderIP":"121.1.128.11","messageID":"<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>"} ::: fileHash=<ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y> ::: fileName=from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: serverIP=121.1.128.11 ::: emailFrom=mike@h2-eco.com ::: created_at=2022-12-23T00:43:26.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Invoice 65148-22374 from Sandiegoprivatebank Payroll ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-23T00:43:26.000Z ::: emailSendingServer=121.1.128.11 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: Invoice 65148-22374 from Sandiegoprivatebank Payroll
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-23T00:43:26.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: mike@h2-eco.com subj: Invoice 65148-22374 from Sandiegoprivatebank Payroll
severitycode: 2
sensitivity: normal
emailsendingserver: 212.227.126.131
messagetype: email_protection_event
emailfrom: mike@h2-eco.com
sourceinfo: unknown
filehash: <ec0f4efd45686dec4715e0813d170b64@WIN-WRT8O9JM5Y>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 121.1.128.11 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=226.93.9.244 dst=16.13.83.11 protocol=tcp sport=80 dport=19434 decision=blocked | {
"action": "block",
"clientport": 19434,
"message": "<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=226.93.9.244 dst=16.13.83.11 protocol=tcp sport=80 dport=19434 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "16.13.83.11",
"serverIP": "226.93.9.244"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=226.93.9.244 dst=16.13.83.11 protocol=tcp sport=80 dport=19434 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=226.93.9.244 dst=16.13.83.11 protocol=tcp sport=80 dport=19434 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 19434
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 16.13.83.11
serverIP: 226.93.9.244 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=98.137.84.36 dst=113.14.122.229 protocol=tcp sport=80 dport=19434 decision=blocked | {
"action": "block",
"clientport": 19434,
"message": "<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=98.137.84.36 dst=113.14.122.229 protocol=tcp sport=80 dport=19434 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "113.14.122.229",
"serverIP": "98.137.84.36"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=98.137.84.36 dst=113.14.122.229 protocol=tcp sport=80 dport=19434 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=98.137.84.36 dst=113.14.122.229 protocol=tcp sport=80 dport=19434 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 19434
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 113.14.122.229
serverIP: 98.137.84.36 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=7.97.17.195 dst=199.103.69.232 protocol=tcp sport=80 dport=19434 decision=blocked | {
"action": "block",
"clientport": 19434,
"message": "<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=7.97.17.195 dst=199.103.69.232 protocol=tcp sport=80 dport=19434 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "199.103.69.232",
"serverIP": "7.97.17.195"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=7.97.17.195 dst=199.103.69.232 protocol=tcp sport=80 dport=19434 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=7.97.17.195 dst=199.103.69.232 protocol=tcp sport=80 dport=19434 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 19434
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 199.103.69.232
serverIP: 7.97.17.195 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=97.223.103.98 dst=133.155.147.64 protocol=tcp sport=80 dport=19434 decision=blocked | {
"action": "block",
"clientport": 19434,
"message": "<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=97.223.103.98 dst=133.155.147.64 protocol=tcp sport=80 dport=19434 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "133.155.147.64",
"serverIP": "97.223.103.98"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=97.223.103.98 dst=133.155.147.64 protocol=tcp sport=80 dport=19434 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1687403182.384815508 NORDC_MX400_1 l7_firewall src=97.223.103.98 dst=133.155.147.64 protocol=tcp sport=80 dport=19434 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 19434
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 133.155.147.64
serverIP: 97.223.103.98 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=220.191.134.168 dst=67.111.250.154 protocol=tcp sport=59650 dport=443 decision=blocked | {
"action": "block",
"clientport": 59650,
"message": "<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=220.191.134.168 dst=67.111.250.154 protocol=tcp sport=59650 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "220.191.134.168",
"serverIP": "67.111.250.154"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=220.191.134.168 dst=67.111.250.154 protocol=tcp sport=59650 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=220.191.134.168 dst=67.111.250.154 protocol=tcp sport=59650 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59650
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 220.191.134.168
serverIP: 67.111.250.154 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=159.95.59.225 dst=129.250.104.249 protocol=tcp sport=59650 dport=443 decision=blocked | {
"action": "block",
"clientport": 59650,
"message": "<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=159.95.59.225 dst=129.250.104.249 protocol=tcp sport=59650 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "159.95.59.225",
"serverIP": "129.250.104.249"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=159.95.59.225 dst=129.250.104.249 protocol=tcp sport=59650 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=159.95.59.225 dst=129.250.104.249 protocol=tcp sport=59650 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59650
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 159.95.59.225
serverIP: 129.250.104.249 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=48.233.168.86 dst=11.21.71.99 protocol=tcp sport=59650 dport=443 decision=blocked | {
"action": "block",
"clientport": 59650,
"message": "<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=48.233.168.86 dst=11.21.71.99 protocol=tcp sport=59650 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "48.233.168.86",
"serverIP": "11.21.71.99"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=48.233.168.86 dst=11.21.71.99 protocol=tcp sport=59650 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=48.233.168.86 dst=11.21.71.99 protocol=tcp sport=59650 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59650
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 48.233.168.86
serverIP: 11.21.71.99 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=96.204.226.156 dst=152.68.153.254 protocol=tcp sport=59650 dport=443 decision=blocked | {
"action": "block",
"clientport": 59650,
"message": "<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=96.204.226.156 dst=152.68.153.254 protocol=tcp sport=59650 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "96.204.226.156",
"serverIP": "152.68.153.254"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=96.204.226.156 dst=152.68.153.254 protocol=tcp sport=59650 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688664779.788015996 NORDC_MX400_1 l7_firewall src=96.204.226.156 dst=152.68.153.254 protocol=tcp sport=59650 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59650
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 96.204.226.156
serverIP: 152.68.153.254 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=90.238.78.200 dst=207.62.105.146 protocol=tcp sport=65302 dport=443 decision=blocked | {
"action": "block",
"clientport": 65302,
"message": "<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=90.238.78.200 dst=207.62.105.146 protocol=tcp sport=65302 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "90.238.78.200",
"serverIP": "207.62.105.146"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=90.238.78.200 dst=207.62.105.146 protocol=tcp sport=65302 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=90.238.78.200 dst=207.62.105.146 protocol=tcp sport=65302 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 65302
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 90.238.78.200
serverIP: 207.62.105.146 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=58.117.248.217 dst=250.53.74.191 protocol=tcp sport=65302 dport=443 decision=blocked | {
"action": "block",
"clientport": 65302,
"message": "<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=58.117.248.217 dst=250.53.74.191 protocol=tcp sport=65302 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "58.117.248.217",
"serverIP": "250.53.74.191"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=58.117.248.217 dst=250.53.74.191 protocol=tcp sport=65302 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=58.117.248.217 dst=250.53.74.191 protocol=tcp sport=65302 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 65302
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 58.117.248.217
serverIP: 250.53.74.191 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=121.241.97.203 dst=50.222.36.249 protocol=tcp sport=65302 dport=443 decision=blocked | {
"action": "block",
"clientport": 65302,
"message": "<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=121.241.97.203 dst=50.222.36.249 protocol=tcp sport=65302 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "121.241.97.203",
"serverIP": "50.222.36.249"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=121.241.97.203 dst=50.222.36.249 protocol=tcp sport=65302 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=121.241.97.203 dst=50.222.36.249 protocol=tcp sport=65302 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 65302
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 121.241.97.203
serverIP: 50.222.36.249 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=44.121.39.223 dst=202.34.92.120 protocol=tcp sport=65302 dport=443 decision=blocked | {
"action": "block",
"clientport": 65302,
"message": "<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=44.121.39.223 dst=202.34.92.120 protocol=tcp sport=65302 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "44.121.39.223",
"serverIP": "202.34.92.120"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=44.121.39.223 dst=202.34.92.120 protocol=tcp sport=65302 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689578022.018203170 NORDC_MX400_1 l7_firewall src=44.121.39.223 dst=202.34.92.120 protocol=tcp sport=65302 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 65302
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 44.121.39.223
serverIP: 202.34.92.120 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-09-30T10:29:02.060Z","agent":{"ephemeral_id":"36976287-4fe3-40b9-a82f-3692c2392d77","id":"6846763b-21b7-49f0-ab99-104d7b3b0a78","name":"ADAudit1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-09-30T10:29:03.649Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"ADAudit1.oscorp.org"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tOSCORP\n\tLogon ID:\t\t0xA8AA552\n\nPrivileges:\t\tSeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"OSCORP (oscorp.oscorpcloud.com)","senderHost":"ADAudit1.oscorp.org","sensitivity":"normal","winlog":{"activity_id":"{2692d4fa-34c2-4626-bb80-c9fc33265209}","api":"wineventlog","channel":"Security","computer_name":"ADAudit1.oscorp.org","event_data":{"PrivilegeList":"SeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"OSCORP","SubjectLogonId":"0xa8aa552","SubjectUserName":"johndoe","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":712,"thread":{"id":756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":5016542,"task":"Special Logon"}} | {
"senderhost": "ADAudit1.uwca.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4672",
"microsoft-windows-security-auditing",
"security_privilege_change"
],
"productids": [
43
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2022-09-30T10:29:02.060Z\",\"agent\":{\"ephemeral_id\":\"36976287-4fe3-40b9-a82f-3692c2392d77\",\"id\":\"6846763b-21b7-49f0-ab99-104d7b3b0a78\",\"name\":\"ADAudit1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Special Logon\",\"code\":\"4672\",\"created\":\"2022-09-30T10:29:03.649Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"ADAudit1.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"Special privileges assigned to new logon.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tOSCORP\\n\\tLogon ID:\\t\\t0xA8AA552\\n\\nPrivileges:\\t\\tSeSecurityPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\",\"organization\":\"OSCORP (oscorp.oscorpcloud.com)\",\"senderHost\":\"ADAudit1.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{2692d4fa-34c2-4626-bb80-c9fc33265209}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"ADAudit1.oscorp.org\",\"event_data\":{\"PrivilegeList\":\"SeSecurityPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\",\"SubjectDomainName\":\"OSCORP\",\"SubjectLogonId\":\"0xa8aa552\",\"SubjectUserName\":\"johndoe\",\"SubjectUserSid\":\"S-1-5-18\"},\"event_id\":\"4672\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":712,\"thread\":{\"id\":756}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":5016542,\"task\":\"Special Logon\"}}",
"sensitivity": "normal",
"messagetype": "security_privilege_change",
"vendorcode": "5016542",
"action": "Special Logon",
"streamName": "microsoft-windows-security-auditing",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-09-30T10:29:02.060Z","agent":{"ephemeral_id":"36976287-4fe3-40b9-a82f-3692c2392d77","id":"6846763b-21b7-49f0-ab99-104d7b3b0a78","name":"ADAudit1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-09-30T10:29:03.649Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"ADAudit1.oscorp.org"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tOSCORP\n\tLogon ID:\t\t0xA8AA552\n\nPrivileges:\t\tSeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"OSCORP (oscorp.oscorpcloud.com)","senderHost":"ADAudit1.oscorp.org","sensitivity":"normal","winlog":{"activity_id":"{2692d4fa-34c2-4626-bb80-c9fc33265209}","api":"wineventlog","channel":"Security","computer_name":"ADAudit1.oscorp.org","event_data":{"PrivilegeList":"SeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"OSCORP","SubjectLogonId":"0xa8aa552","SubjectUserName":"johndoe","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":712,"thread":{"id":756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":5016542,"task":"Special Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-09-30T10:29:02.060Z","agent":{"ephemeral_id":"36976287-4fe3-40b9-a82f-3692c2392d77","id":"6846763b-21b7-49f0-ab99-104d7b3b0a78","name":"ADAudit1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-09-30T10:29:03.649Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"ADAudit1.oscorp.org"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tOSCORP\n\tLogon ID:\t\t0xA8AA552\n\nPrivileges:\t\tSeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"OSCORP (oscorp.oscorpcloud.com)","senderHost":"ADAudit1.oscorp.org","sensitivity":"normal","winlog":{"activity_id":"{2692d4fa-34c2-4626-bb80-c9fc33265209}","api":"wineventlog","channel":"Security","computer_name":"ADAudit1.oscorp.org","event_data":{"PrivilegeList":"SeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"OSCORP","SubjectLogonId":"0xa8aa552","SubjectUserName":"johndoe","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":712,"thread":{"id":756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":5016542,"task":"Special Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: ADAudit1.uwca.org
severitylabel: Info
tags: ['v8', 'eventId:4672', 'microsoft-windows-security-auditing', 'security_privilege_change']
productids: [43]
sourceinfo: unknown
sensitivity: normal
messagetype: security_privilege_change
vendorcode: 5016542
action: Special Logon
streamName: microsoft-windows-security-auditing
userName: johndoe | Explain this syslog message |
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=19.80.100.211 dst=13.232.135.33 protocol=udp sport=57079 dport=32475 decision=blocked | {
"action": "block",
"clientport": 57079,
"message": "<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=19.80.100.211 dst=13.232.135.33 protocol=udp sport=57079 dport=32475 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 32475,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "19.80.100.211",
"serverIP": "13.232.135.33"
} | Create a JSON artifact from the message |
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=19.80.100.211 dst=13.232.135.33 protocol=udp sport=57079 dport=32475 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=19.80.100.211 dst=13.232.135.33 protocol=udp sport=57079 dport=32475 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57079
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 32475
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 19.80.100.211
serverIP: 13.232.135.33 | Explain this syslog message |
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=18.87.105.77 dst=194.138.193.74 protocol=udp sport=57079 dport=32475 decision=blocked | {
"action": "block",
"clientport": 57079,
"message": "<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=18.87.105.77 dst=194.138.193.74 protocol=udp sport=57079 dport=32475 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 32475,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "18.87.105.77",
"serverIP": "194.138.193.74"
} | Create a JSON artifact from the message |
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=18.87.105.77 dst=194.138.193.74 protocol=udp sport=57079 dport=32475 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=18.87.105.77 dst=194.138.193.74 protocol=udp sport=57079 dport=32475 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57079
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 32475
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 18.87.105.77
serverIP: 194.138.193.74 | Explain this syslog message |
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=174.124.231.231 dst=164.19.215.205 protocol=udp sport=57079 dport=32475 decision=blocked | {
"action": "block",
"clientport": 57079,
"message": "<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=174.124.231.231 dst=164.19.215.205 protocol=udp sport=57079 dport=32475 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 32475,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "174.124.231.231",
"serverIP": "164.19.215.205"
} | Create a JSON artifact from the message |
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=174.124.231.231 dst=164.19.215.205 protocol=udp sport=57079 dport=32475 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=174.124.231.231 dst=164.19.215.205 protocol=udp sport=57079 dport=32475 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57079
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 32475
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 174.124.231.231
serverIP: 164.19.215.205 | Explain this syslog message |
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=57.89.78.166 dst=114.79.121.82 protocol=udp sport=57079 dport=32475 decision=blocked | {
"action": "block",
"clientport": 57079,
"message": "<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=57.89.78.166 dst=114.79.121.82 protocol=udp sport=57079 dport=32475 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 32475,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "57.89.78.166",
"serverIP": "114.79.121.82"
} | Create a JSON artifact from the message |
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=57.89.78.166 dst=114.79.121.82 protocol=udp sport=57079 dport=32475 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=198.24.89.6 1 1688252932.596831184 M66_MX67C_HHI l7_firewall src=57.89.78.166 dst=114.79.121.82 protocol=udp sport=57079 dport=32475 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57079
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 32475
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 57.89.78.166
serverIP: 114.79.121.82 | Explain this syslog message |
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=213.80.20.115 dst=232.24.18.245 protocol=tcp sport=63878 dport=443 decision=blocked | {
"action": "block",
"clientport": 63878,
"message": "<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=213.80.20.115 dst=232.24.18.245 protocol=tcp sport=63878 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "213.80.20.115",
"serverIP": "232.24.18.245"
} | Create a JSON artifact from the message |
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=213.80.20.115 dst=232.24.18.245 protocol=tcp sport=63878 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=213.80.20.115 dst=232.24.18.245 protocol=tcp sport=63878 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 63878
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 213.80.20.115
serverIP: 232.24.18.245 | Explain this syslog message |
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=113.192.60.31 dst=210.27.19.245 protocol=tcp sport=63878 dport=443 decision=blocked | {
"action": "block",
"clientport": 63878,
"message": "<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=113.192.60.31 dst=210.27.19.245 protocol=tcp sport=63878 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "113.192.60.31",
"serverIP": "210.27.19.245"
} | Create a JSON artifact from the message |
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=113.192.60.31 dst=210.27.19.245 protocol=tcp sport=63878 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=113.192.60.31 dst=210.27.19.245 protocol=tcp sport=63878 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 63878
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 113.192.60.31
serverIP: 210.27.19.245 | Explain this syslog message |
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=163.154.72.69 dst=231.227.101.68 protocol=tcp sport=63878 dport=443 decision=blocked | {
"action": "block",
"clientport": 63878,
"message": "<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=163.154.72.69 dst=231.227.101.68 protocol=tcp sport=63878 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "163.154.72.69",
"serverIP": "231.227.101.68"
} | Create a JSON artifact from the message |
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=163.154.72.69 dst=231.227.101.68 protocol=tcp sport=63878 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=163.154.72.69 dst=231.227.101.68 protocol=tcp sport=63878 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 63878
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 163.154.72.69
serverIP: 231.227.101.68 | Explain this syslog message |
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=72.175.98.137 dst=169.16.184.11 protocol=tcp sport=63878 dport=443 decision=blocked | {
"action": "block",
"clientport": 63878,
"message": "<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=72.175.98.137 dst=169.16.184.11 protocol=tcp sport=63878 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "72.175.98.137",
"serverIP": "169.16.184.11"
} | Create a JSON artifact from the message |
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=72.175.98.137 dst=169.16.184.11 protocol=tcp sport=63878 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.96.192.50 1 1690547642.349147494 M57_MX67C_PanamaCity l7_firewall src=72.175.98.137 dst=169.16.184.11 protocol=tcp sport=63878 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 63878
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 72.175.98.137
serverIP: 169.16.184.11 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=251.255.214.119 dst=199.99.114.200 protocol=tcp sport=57924 dport=443 decision=blocked | {
"action": "block",
"clientport": 57924,
"message": "<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=251.255.214.119 dst=199.99.114.200 protocol=tcp sport=57924 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "251.255.214.119",
"serverIP": "199.99.114.200"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=251.255.214.119 dst=199.99.114.200 protocol=tcp sport=57924 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=251.255.214.119 dst=199.99.114.200 protocol=tcp sport=57924 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57924
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 251.255.214.119
serverIP: 199.99.114.200 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=199.104.1.127 dst=221.194.24.184 protocol=tcp sport=57924 dport=443 decision=blocked | {
"action": "block",
"clientport": 57924,
"message": "<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=199.104.1.127 dst=221.194.24.184 protocol=tcp sport=57924 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "199.104.1.127",
"serverIP": "221.194.24.184"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=199.104.1.127 dst=221.194.24.184 protocol=tcp sport=57924 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=199.104.1.127 dst=221.194.24.184 protocol=tcp sport=57924 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57924
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 199.104.1.127
serverIP: 221.194.24.184 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=77.121.246.22 dst=101.18.247.101 protocol=tcp sport=57924 dport=443 decision=blocked | {
"action": "block",
"clientport": 57924,
"message": "<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=77.121.246.22 dst=101.18.247.101 protocol=tcp sport=57924 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "77.121.246.22",
"serverIP": "101.18.247.101"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690798104.423884509 NORDC_MX400_1 l7_firewall src=77.121.246.22 dst=101.18.247.101 protocol=tcp sport=57924 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.