input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"200.38.200.85","externalIp":"203.1.208.49","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=200.38.200.85 ::: serverIP=203.1.208.49 ::: userName=charlie ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-24T16:55:32.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 200.38.200.85 serverIP: 203.1.208.49 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"117.142.99.94","externalIp":"209.5.142.219","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=117.142.99.94 ::: serverIP=209.5.142.219 ::: userName=charlie ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-24T16:55:32.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535533968,\"originType\":\"Network Devices\",\"internalIp\":\"117.142.99.94\",\"externalIp\":\"209.5.142.219\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:32.000Z\"} ::: clientIP=117.142.99.94 ::: serverIP=209.5.142.219 ::: userName=charlie ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "117.142.99.94", "serverIP": "209.5.142.219", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"117.142.99.94","externalIp":"209.5.142.219","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=117.142.99.94 ::: serverIP=209.5.142.219 ::: userName=charlie ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"117.142.99.94","externalIp":"209.5.142.219","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=117.142.99.94 ::: serverIP=209.5.142.219 ::: userName=charlie ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-24T16:55:32.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 117.142.99.94 serverIP: 209.5.142.219 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"204.173.132.49","externalIp":"198.87.21.240","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=204.173.132.49 ::: serverIP=198.87.21.240 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-24T17:15:06.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535289661,\"originType\":\"Network Devices\",\"internalIp\":\"204.173.132.49\",\"externalIp\":\"198.87.21.240\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T17:15:06.000Z\"} ::: clientIP=204.173.132.49 ::: serverIP=198.87.21.240 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "204.173.132.49", "serverIP": "198.87.21.240", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"204.173.132.49","externalIp":"198.87.21.240","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=204.173.132.49 ::: serverIP=198.87.21.240 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"204.173.132.49","externalIp":"198.87.21.240","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=204.173.132.49 ::: serverIP=198.87.21.240 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-24T17:15:06.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 204.173.132.49 serverIP: 198.87.21.240 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"22.170.5.191","externalIp":"14.106.111.205","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=22.170.5.191 ::: serverIP=14.106.111.205 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-24T17:15:06.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535289661,\"originType\":\"Network Devices\",\"internalIp\":\"22.170.5.191\",\"externalIp\":\"14.106.111.205\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T17:15:06.000Z\"} ::: clientIP=22.170.5.191 ::: serverIP=14.106.111.205 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "22.170.5.191", "serverIP": "14.106.111.205", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"22.170.5.191","externalIp":"14.106.111.205","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=22.170.5.191 ::: serverIP=14.106.111.205 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"22.170.5.191","externalIp":"14.106.111.205","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=22.170.5.191 ::: serverIP=14.106.111.205 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-24T17:15:06.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 22.170.5.191 serverIP: 14.106.111.205 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"115.15.60.97","externalIp":"141.131.102.80","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=115.15.60.97 ::: serverIP=141.131.102.80 ::: userName=nighthawk ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-24T16:55:32.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535533968,\"originType\":\"Network Devices\",\"internalIp\":\"115.15.60.97\",\"externalIp\":\"141.131.102.80\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:32.000Z\"} ::: clientIP=115.15.60.97 ::: serverIP=141.131.102.80 ::: userName=nighthawk ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "115.15.60.97", "serverIP": "141.131.102.80", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"115.15.60.97","externalIp":"141.131.102.80","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=115.15.60.97 ::: serverIP=141.131.102.80 ::: userName=nighthawk ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"115.15.60.97","externalIp":"141.131.102.80","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=115.15.60.97 ::: serverIP=141.131.102.80 ::: userName=nighthawk ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-24T16:55:32.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 115.15.60.97 serverIP: 141.131.102.80 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"186.240.203.233","externalIp":"207.142.153.238","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=186.240.203.233 ::: serverIP=207.142.153.238 ::: userName=johndoe ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-24T16:55:32.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535533968,\"originType\":\"Network Devices\",\"internalIp\":\"186.240.203.233\",\"externalIp\":\"207.142.153.238\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:32.000Z\"} ::: clientIP=186.240.203.233 ::: serverIP=207.142.153.238 ::: userName=johndoe ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "186.240.203.233", "serverIP": "207.142.153.238", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"186.240.203.233","externalIp":"207.142.153.238","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=186.240.203.233 ::: serverIP=207.142.153.238 ::: userName=johndoe ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"186.240.203.233","externalIp":"207.142.153.238","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=186.240.203.233 ::: serverIP=207.142.153.238 ::: userName=johndoe ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-24T16:55:32.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 186.240.203.233 serverIP: 207.142.153.238 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"227.21.49.48","externalIp":"231.90.243.127","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=227.21.49.48 ::: serverIP=231.90.243.127 ::: userName=bob ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-24T16:55:32.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535533968,\"originType\":\"Network Devices\",\"internalIp\":\"227.21.49.48\",\"externalIp\":\"231.90.243.127\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:32.000Z\"} ::: clientIP=227.21.49.48 ::: serverIP=231.90.243.127 ::: userName=bob ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "227.21.49.48", "serverIP": "231.90.243.127", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"227.21.49.48","externalIp":"231.90.243.127","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=227.21.49.48 ::: serverIP=231.90.243.127 ::: userName=bob ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"227.21.49.48","externalIp":"231.90.243.127","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=227.21.49.48 ::: serverIP=231.90.243.127 ::: userName=bob ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-24T16:55:32.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 227.21.49.48 serverIP: 231.90.243.127 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"148.97.216.7","externalIp":"122.62.222.110","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=148.97.216.7 ::: serverIP=122.62.222.110 ::: userName=janedoe ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-24T16:55:32.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535533968,\"originType\":\"Network Devices\",\"internalIp\":\"148.97.216.7\",\"externalIp\":\"122.62.222.110\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:32.000Z\"} ::: clientIP=148.97.216.7 ::: serverIP=122.62.222.110 ::: userName=janedoe ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "148.97.216.7", "serverIP": "122.62.222.110", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"148.97.216.7","externalIp":"122.62.222.110","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=148.97.216.7 ::: serverIP=122.62.222.110 ::: userName=janedoe ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"148.97.216.7","externalIp":"122.62.222.110","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=148.97.216.7 ::: serverIP=122.62.222.110 ::: userName=janedoe ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-24T16:55:32.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 148.97.216.7 serverIP: 122.62.222.110 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"31.44.27.118","externalIp":"32.54.114.84","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=31.44.27.118 ::: serverIP=32.54.114.84 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-11T15:49:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":539210895,\"originType\":\"AD Users\",\"internalIp\":\"31.44.27.118\",\"externalIp\":\"32.54.114.84\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-11T15:49:58.000Z\"} ::: clientIP=31.44.27.118 ::: serverIP=32.54.114.84 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "plants.appcnt.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "plants.appcnt.com", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "31.44.27.118", "serverIP": "32.54.114.84", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"31.44.27.118","externalIp":"32.54.114.84","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=31.44.27.118 ::: serverIP=32.54.114.84 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"31.44.27.118","externalIp":"32.54.114.84","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=31.44.27.118 ::: serverIP=32.54.114.84 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-11T15:49:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: plants.appcnt.com messagetype: firewall_action severitycode: 2 fqdn: plants.appcnt.com vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 31.44.27.118 serverIP: 32.54.114.84 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"203.185.189.127","externalIp":"58.248.32.237","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=203.185.189.127 ::: serverIP=58.248.32.237 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-11T15:49:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":539210895,\"originType\":\"AD Users\",\"internalIp\":\"203.185.189.127\",\"externalIp\":\"58.248.32.237\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-11T15:49:58.000Z\"} ::: clientIP=203.185.189.127 ::: serverIP=58.248.32.237 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "plants.appcnt.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "plants.appcnt.com", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "203.185.189.127", "serverIP": "58.248.32.237", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"203.185.189.127","externalIp":"58.248.32.237","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=203.185.189.127 ::: serverIP=58.248.32.237 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"203.185.189.127","externalIp":"58.248.32.237","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=203.185.189.127 ::: serverIP=58.248.32.237 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-11T15:49:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: plants.appcnt.com messagetype: firewall_action severitycode: 2 fqdn: plants.appcnt.com vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 203.185.189.127 serverIP: 58.248.32.237 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"105.180.114.74","externalIp":"13.82.27.251","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=105.180.114.74 ::: serverIP=13.82.27.251 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-11T15:49:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":539210895,\"originType\":\"AD Users\",\"internalIp\":\"105.180.114.74\",\"externalIp\":\"13.82.27.251\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-11T15:49:58.000Z\"} ::: clientIP=105.180.114.74 ::: serverIP=13.82.27.251 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "plants.appcnt.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "plants.appcnt.com", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "105.180.114.74", "serverIP": "13.82.27.251", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"105.180.114.74","externalIp":"13.82.27.251","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=105.180.114.74 ::: serverIP=13.82.27.251 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"105.180.114.74","externalIp":"13.82.27.251","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=105.180.114.74 ::: serverIP=13.82.27.251 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-11T15:49:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: plants.appcnt.com messagetype: firewall_action severitycode: 2 fqdn: plants.appcnt.com vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 105.180.114.74 serverIP: 13.82.27.251 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"221.66.183.248","externalIp":"26.162.121.145","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=221.66.183.248 ::: serverIP=26.162.121.145 ::: userName=johndoe ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-11T15:49:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":539210895,\"originType\":\"AD Users\",\"internalIp\":\"221.66.183.248\",\"externalIp\":\"26.162.121.145\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-11T15:49:58.000Z\"} ::: clientIP=221.66.183.248 ::: serverIP=26.162.121.145 ::: userName=johndoe ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "plants.appcnt.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "plants.appcnt.com", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "221.66.183.248", "serverIP": "26.162.121.145", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"221.66.183.248","externalIp":"26.162.121.145","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=221.66.183.248 ::: serverIP=26.162.121.145 ::: userName=johndoe ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"221.66.183.248","externalIp":"26.162.121.145","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=221.66.183.248 ::: serverIP=26.162.121.145 ::: userName=johndoe ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-11T15:49:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: plants.appcnt.com messagetype: firewall_action severitycode: 2 fqdn: plants.appcnt.com vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 221.66.183.248 serverIP: 26.162.121.145 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"78.213.2.223","externalIp":"69.180.77.227","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=78.213.2.223 ::: serverIP=69.180.77.227 ::: userName=alice ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-27T16:54:20.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":535422304,\"originType\":\"Network Devices\",\"internalIp\":\"78.213.2.223\",\"externalIp\":\"69.180.77.227\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-27T16:54:20.000Z\"} ::: clientIP=78.213.2.223 ::: serverIP=69.180.77.227 ::: userName=alice ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "plants.appcnt.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "plants.appcnt.com", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "78.213.2.223", "serverIP": "69.180.77.227", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"78.213.2.223","externalIp":"69.180.77.227","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=78.213.2.223 ::: serverIP=69.180.77.227 ::: userName=alice ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"78.213.2.223","externalIp":"69.180.77.227","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=78.213.2.223 ::: serverIP=69.180.77.227 ::: userName=alice ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-27T16:54:20.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: plants.appcnt.com messagetype: firewall_action severitycode: 2 fqdn: plants.appcnt.com vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 78.213.2.223 serverIP: 69.180.77.227 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"81.162.95.104","externalIp":"217.194.76.254","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=81.162.95.104 ::: serverIP=217.194.76.254 ::: userName=janedoe ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-27T16:54:20.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":535422304,\"originType\":\"Network Devices\",\"internalIp\":\"81.162.95.104\",\"externalIp\":\"217.194.76.254\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-27T16:54:20.000Z\"} ::: clientIP=81.162.95.104 ::: serverIP=217.194.76.254 ::: userName=janedoe ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "plants.appcnt.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "plants.appcnt.com", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "81.162.95.104", "serverIP": "217.194.76.254", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"81.162.95.104","externalIp":"217.194.76.254","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=81.162.95.104 ::: serverIP=217.194.76.254 ::: userName=janedoe ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"81.162.95.104","externalIp":"217.194.76.254","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=81.162.95.104 ::: serverIP=217.194.76.254 ::: userName=janedoe ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-27T16:54:20.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: plants.appcnt.com messagetype: firewall_action severitycode: 2 fqdn: plants.appcnt.com vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 81.162.95.104 serverIP: 217.194.76.254 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=url7169.kwikqy.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"254.127.47.156","externalIp":"166.59.237.48","categories":["Malware","Newly Seen Domains"],"tags":[],"destination":"url7169.kwikqy.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-23T19:08:49.000Z"} ::: clientIP=254.127.47.156 ::: serverIP=166.59.237.48 ::: userName=fish ::: created_at=2022-06-23T19:08:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNewly Seen Domains ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T19:08:49.000Z ::: serverHostname=url7169.kwikqy.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-23T19:08:49.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=url7169.kwikqy.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"254.127.47.156\",\"externalIp\":\"166.59.237.48\",\"categories\":[\"Malware\",\"Newly Seen Domains\"],\"tags\":[],\"destination\":\"url7169.kwikqy.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T19:08:49.000Z\"} ::: clientIP=254.127.47.156 ::: serverIP=166.59.237.48 ::: userName=fish ::: created_at=2022-06-23T19:08:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNewly Seen Domains ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T19:08:49.000Z ::: serverHostname=url7169.kwikqy.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "url7169.kwikqy.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "url7169.kwikqy.com", "vendorcode": "MalwareNewly Seen Domains", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "254.127.47.156", "serverIP": "166.59.237.48", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=url7169.kwikqy.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"254.127.47.156","externalIp":"166.59.237.48","categories":["Malware","Newly Seen Domains"],"tags":[],"destination":"url7169.kwikqy.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-23T19:08:49.000Z"} ::: clientIP=254.127.47.156 ::: serverIP=166.59.237.48 ::: userName=fish ::: created_at=2022-06-23T19:08:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNewly Seen Domains ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T19:08:49.000Z ::: serverHostname=url7169.kwikqy.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=url7169.kwikqy.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"254.127.47.156","externalIp":"166.59.237.48","categories":["Malware","Newly Seen Domains"],"tags":[],"destination":"url7169.kwikqy.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-23T19:08:49.000Z"} ::: clientIP=254.127.47.156 ::: serverIP=166.59.237.48 ::: userName=fish ::: created_at=2022-06-23T19:08:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNewly Seen Domains ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T19:08:49.000Z ::: serverHostname=url7169.kwikqy.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-23T19:08:49.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: url7169.kwikqy.com messagetype: firewall_action severitycode: 2 fqdn: url7169.kwikqy.com vendorcode: MalwareNewly Seen Domains action: block streamName: OpenDNS Detection clientIP: 254.127.47.156 serverIP: 166.59.237.48 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=url7169.kwikqy.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"25.32.199.159","externalIp":"177.90.218.36","categories":["Malware","Newly Seen Domains"],"tags":[],"destination":"url7169.kwikqy.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-23T19:08:49.000Z"} ::: clientIP=25.32.199.159 ::: serverIP=177.90.218.36 ::: userName=charlie ::: created_at=2022-06-23T19:08:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNewly Seen Domains ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T19:08:49.000Z ::: serverHostname=url7169.kwikqy.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-23T19:08:49.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=url7169.kwikqy.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"25.32.199.159\",\"externalIp\":\"177.90.218.36\",\"categories\":[\"Malware\",\"Newly Seen Domains\"],\"tags\":[],\"destination\":\"url7169.kwikqy.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T19:08:49.000Z\"} ::: clientIP=25.32.199.159 ::: serverIP=177.90.218.36 ::: userName=charlie ::: created_at=2022-06-23T19:08:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNewly Seen Domains ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T19:08:49.000Z ::: serverHostname=url7169.kwikqy.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "url7169.kwikqy.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "url7169.kwikqy.com", "vendorcode": "MalwareNewly Seen Domains", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "25.32.199.159", "serverIP": "177.90.218.36", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=url7169.kwikqy.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"25.32.199.159","externalIp":"177.90.218.36","categories":["Malware","Newly Seen Domains"],"tags":[],"destination":"url7169.kwikqy.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-23T19:08:49.000Z"} ::: clientIP=25.32.199.159 ::: serverIP=177.90.218.36 ::: userName=charlie ::: created_at=2022-06-23T19:08:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNewly Seen Domains ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T19:08:49.000Z ::: serverHostname=url7169.kwikqy.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=url7169.kwikqy.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"25.32.199.159","externalIp":"177.90.218.36","categories":["Malware","Newly Seen Domains"],"tags":[],"destination":"url7169.kwikqy.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-23T19:08:49.000Z"} ::: clientIP=25.32.199.159 ::: serverIP=177.90.218.36 ::: userName=charlie ::: created_at=2022-06-23T19:08:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNewly Seen Domains ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T19:08:49.000Z ::: serverHostname=url7169.kwikqy.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-23T19:08:49.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: url7169.kwikqy.com messagetype: firewall_action severitycode: 2 fqdn: url7169.kwikqy.com vendorcode: MalwareNewly Seen Domains action: block streamName: OpenDNS Detection clientIP: 25.32.199.159 serverIP: 177.90.218.36 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"72.122.167.72","externalIp":"144.42.204.250","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=72.122.167.72 ::: serverIP=144.42.204.250 ::: userName=nighthawk ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-11T15:49:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":539210895,\"originType\":\"AD Users\",\"internalIp\":\"72.122.167.72\",\"externalIp\":\"144.42.204.250\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-11T15:49:58.000Z\"} ::: clientIP=72.122.167.72 ::: serverIP=144.42.204.250 ::: userName=nighthawk ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "plants.appcnt.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "plants.appcnt.com", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "72.122.167.72", "serverIP": "144.42.204.250", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"72.122.167.72","externalIp":"144.42.204.250","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=72.122.167.72 ::: serverIP=144.42.204.250 ::: userName=nighthawk ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"72.122.167.72","externalIp":"144.42.204.250","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=72.122.167.72 ::: serverIP=144.42.204.250 ::: userName=nighthawk ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-11T15:49:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: plants.appcnt.com messagetype: firewall_action severitycode: 2 fqdn: plants.appcnt.com vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 72.122.167.72 serverIP: 144.42.204.250 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"108.242.135.200","externalIp":"96.108.87.75","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=108.242.135.200 ::: serverIP=96.108.87.75 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-11T15:49:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":539210895,\"originType\":\"AD Users\",\"internalIp\":\"108.242.135.200\",\"externalIp\":\"96.108.87.75\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-11T15:49:58.000Z\"} ::: clientIP=108.242.135.200 ::: serverIP=96.108.87.75 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "plants.appcnt.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "plants.appcnt.com", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "108.242.135.200", "serverIP": "96.108.87.75", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"108.242.135.200","externalIp":"96.108.87.75","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=108.242.135.200 ::: serverIP=96.108.87.75 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"108.242.135.200","externalIp":"96.108.87.75","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=108.242.135.200 ::: serverIP=96.108.87.75 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-11T15:49:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: plants.appcnt.com messagetype: firewall_action severitycode: 2 fqdn: plants.appcnt.com vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 108.242.135.200 serverIP: 96.108.87.75 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"6.228.75.122","externalIp":"212.239.249.137","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=6.228.75.122 ::: serverIP=212.239.249.137 ::: userName=charlie ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-27T16:54:20.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":535422304,\"originType\":\"Network Devices\",\"internalIp\":\"6.228.75.122\",\"externalIp\":\"212.239.249.137\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-27T16:54:20.000Z\"} ::: clientIP=6.228.75.122 ::: serverIP=212.239.249.137 ::: userName=charlie ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "plants.appcnt.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "plants.appcnt.com", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "6.228.75.122", "serverIP": "212.239.249.137", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"6.228.75.122","externalIp":"212.239.249.137","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=6.228.75.122 ::: serverIP=212.239.249.137 ::: userName=charlie ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"6.228.75.122","externalIp":"212.239.249.137","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=6.228.75.122 ::: serverIP=212.239.249.137 ::: userName=charlie ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-27T16:54:20.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: plants.appcnt.com messagetype: firewall_action severitycode: 2 fqdn: plants.appcnt.com vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 6.228.75.122 serverIP: 212.239.249.137 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"19.226.215.66","externalIp":"86.4.36.245","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=19.226.215.66 ::: serverIP=86.4.36.245 ::: userName=charlie ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-27T16:54:20.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":535422304,\"originType\":\"Network Devices\",\"internalIp\":\"19.226.215.66\",\"externalIp\":\"86.4.36.245\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-27T16:54:20.000Z\"} ::: clientIP=19.226.215.66 ::: serverIP=86.4.36.245 ::: userName=charlie ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "plants.appcnt.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "plants.appcnt.com", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "19.226.215.66", "serverIP": "86.4.36.245", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"19.226.215.66","externalIp":"86.4.36.245","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=19.226.215.66 ::: serverIP=86.4.36.245 ::: userName=charlie ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"19.226.215.66","externalIp":"86.4.36.245","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=19.226.215.66 ::: serverIP=86.4.36.245 ::: userName=charlie ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-27T16:54:20.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: plants.appcnt.com messagetype: firewall_action severitycode: 2 fqdn: plants.appcnt.com vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 19.226.215.66 serverIP: 86.4.36.245 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"94.33.92.67","externalIp":"185.248.142.44","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=94.33.92.67 ::: serverIP=185.248.142.44 ::: userName=johndoe ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-27T16:54:20.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":535422304,\"originType\":\"Network Devices\",\"internalIp\":\"94.33.92.67\",\"externalIp\":\"185.248.142.44\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-27T16:54:20.000Z\"} ::: clientIP=94.33.92.67 ::: serverIP=185.248.142.44 ::: userName=johndoe ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "plants.appcnt.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "plants.appcnt.com", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "94.33.92.67", "serverIP": "185.248.142.44", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"94.33.92.67","externalIp":"185.248.142.44","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=94.33.92.67 ::: serverIP=185.248.142.44 ::: userName=johndoe ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"94.33.92.67","externalIp":"185.248.142.44","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=94.33.92.67 ::: serverIP=185.248.142.44 ::: userName=johndoe ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-27T16:54:20.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: plants.appcnt.com messagetype: firewall_action severitycode: 2 fqdn: plants.appcnt.com vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 94.33.92.67 serverIP: 185.248.142.44 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"23.15.11.4","externalIp":"141.30.99.228","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=23.15.11.4 ::: serverIP=141.30.99.228 ::: userName=fish ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-27T16:54:20.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":535422304,\"originType\":\"Network Devices\",\"internalIp\":\"23.15.11.4\",\"externalIp\":\"141.30.99.228\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-27T16:54:20.000Z\"} ::: clientIP=23.15.11.4 ::: serverIP=141.30.99.228 ::: userName=fish ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "plants.appcnt.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "plants.appcnt.com", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "23.15.11.4", "serverIP": "141.30.99.228", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"23.15.11.4","externalIp":"141.30.99.228","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=23.15.11.4 ::: serverIP=141.30.99.228 ::: userName=fish ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"23.15.11.4","externalIp":"141.30.99.228","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=23.15.11.4 ::: serverIP=141.30.99.228 ::: userName=fish ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-27T16:54:20.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: plants.appcnt.com messagetype: firewall_action severitycode: 2 fqdn: plants.appcnt.com vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 23.15.11.4 serverIP: 141.30.99.228 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"9.78.81.226","externalIp":"213.120.187.56","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=9.78.81.226 ::: serverIP=213.120.187.56 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-18T13:19:31.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"9.78.81.226\",\"externalIp\":\"213.120.187.56\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=9.78.81.226 ::: serverIP=213.120.187.56 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.thebassholes.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.thebassholes.com", "vendorcode": "SportsMalwareSports and Recreation", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "9.78.81.226", "serverIP": "213.120.187.56", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"9.78.81.226","externalIp":"213.120.187.56","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=9.78.81.226 ::: serverIP=213.120.187.56 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"9.78.81.226","externalIp":"213.120.187.56","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=9.78.81.226 ::: serverIP=213.120.187.56 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-18T13:19:31.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.thebassholes.com messagetype: firewall_action severitycode: 2 fqdn: www.thebassholes.com vendorcode: SportsMalwareSports and Recreation action: block streamName: OpenDNS Detection clientIP: 9.78.81.226 serverIP: 213.120.187.56 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"61.66.184.122","externalIp":"229.173.181.93","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=61.66.184.122 ::: serverIP=229.173.181.93 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-18T13:19:31.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"61.66.184.122\",\"externalIp\":\"229.173.181.93\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=61.66.184.122 ::: serverIP=229.173.181.93 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.thebassholes.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.thebassholes.com", "vendorcode": "SportsMalwareSports and Recreation", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "61.66.184.122", "serverIP": "229.173.181.93", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"61.66.184.122","externalIp":"229.173.181.93","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=61.66.184.122 ::: serverIP=229.173.181.93 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"61.66.184.122","externalIp":"229.173.181.93","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=61.66.184.122 ::: serverIP=229.173.181.93 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-18T13:19:31.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.thebassholes.com messagetype: firewall_action severitycode: 2 fqdn: www.thebassholes.com vendorcode: SportsMalwareSports and Recreation action: block streamName: OpenDNS Detection clientIP: 61.66.184.122 serverIP: 229.173.181.93 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"95.14.92.21","externalIp":"179.58.223.161","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=95.14.92.21 ::: serverIP=179.58.223.161 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-18T13:19:31.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"95.14.92.21\",\"externalIp\":\"179.58.223.161\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=95.14.92.21 ::: serverIP=179.58.223.161 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.thebassholes.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.thebassholes.com", "vendorcode": "SportsMalwareSports and Recreation", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "95.14.92.21", "serverIP": "179.58.223.161", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"95.14.92.21","externalIp":"179.58.223.161","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=95.14.92.21 ::: serverIP=179.58.223.161 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"95.14.92.21","externalIp":"179.58.223.161","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=95.14.92.21 ::: serverIP=179.58.223.161 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-18T13:19:31.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.thebassholes.com messagetype: firewall_action severitycode: 2 fqdn: www.thebassholes.com vendorcode: SportsMalwareSports and Recreation action: block streamName: OpenDNS Detection clientIP: 95.14.92.21 serverIP: 179.58.223.161 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"105.68.88.153","externalIp":"80.9.121.111","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=105.68.88.153 ::: serverIP=80.9.121.111 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-18T13:19:31.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"105.68.88.153\",\"externalIp\":\"80.9.121.111\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=105.68.88.153 ::: serverIP=80.9.121.111 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.thebassholes.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.thebassholes.com", "vendorcode": "SportsMalwareSports and Recreation", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "105.68.88.153", "serverIP": "80.9.121.111", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"105.68.88.153","externalIp":"80.9.121.111","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=105.68.88.153 ::: serverIP=80.9.121.111 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"105.68.88.153","externalIp":"80.9.121.111","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=105.68.88.153 ::: serverIP=80.9.121.111 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-18T13:19:31.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.thebassholes.com messagetype: firewall_action severitycode: 2 fqdn: www.thebassholes.com vendorcode: SportsMalwareSports and Recreation action: block streamName: OpenDNS Detection clientIP: 105.68.88.153 serverIP: 80.9.121.111 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"22.13.117.65","externalIp":"55.118.2.149","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=22.13.117.65 ::: serverIP=55.118.2.149 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-18T13:19:31.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"22.13.117.65\",\"externalIp\":\"55.118.2.149\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=22.13.117.65 ::: serverIP=55.118.2.149 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.thebassholes.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.thebassholes.com", "vendorcode": "SportsMalwareSports and Recreation", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "22.13.117.65", "serverIP": "55.118.2.149", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"22.13.117.65","externalIp":"55.118.2.149","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=22.13.117.65 ::: serverIP=55.118.2.149 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"22.13.117.65","externalIp":"55.118.2.149","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=22.13.117.65 ::: serverIP=55.118.2.149 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-18T13:19:31.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.thebassholes.com messagetype: firewall_action severitycode: 2 fqdn: www.thebassholes.com vendorcode: SportsMalwareSports and Recreation action: block streamName: OpenDNS Detection clientIP: 22.13.117.65 serverIP: 55.118.2.149 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"217.126.93.62","externalIp":"174.33.9.164","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=217.126.93.62 ::: serverIP=174.33.9.164 ::: userName=bob ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-18T13:19:31.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"217.126.93.62\",\"externalIp\":\"174.33.9.164\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=217.126.93.62 ::: serverIP=174.33.9.164 ::: userName=bob ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.thebassholes.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.thebassholes.com", "vendorcode": "SportsMalwareSports and Recreation", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "217.126.93.62", "serverIP": "174.33.9.164", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"217.126.93.62","externalIp":"174.33.9.164","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=217.126.93.62 ::: serverIP=174.33.9.164 ::: userName=bob ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"217.126.93.62","externalIp":"174.33.9.164","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=217.126.93.62 ::: serverIP=174.33.9.164 ::: userName=bob ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-18T13:19:31.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.thebassholes.com messagetype: firewall_action severitycode: 2 fqdn: www.thebassholes.com vendorcode: SportsMalwareSports and Recreation action: block streamName: OpenDNS Detection clientIP: 217.126.93.62 serverIP: 174.33.9.164 userName: bob
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=122.141.110.3 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "filename": "powershell.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"bob\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=122.141.110.3 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T16:44:43Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "122.141.110.3", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=122.141.110.3 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=122.141.110.3 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c filename: powershell.exe filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T16:44:43Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 122.141.110.3 userName: bob
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=59.173.109.243 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "filename": "powershell.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"janedoe\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=59.173.109.243 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T16:44:43Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "59.173.109.243", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=59.173.109.243 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=59.173.109.243 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c filename: powershell.exe filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T16:44:43Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 59.173.109.243 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:nighthawk.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mumbrellaine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mumbrellaine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mumbrellaine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=110.230.190.166 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVISAASUATWEB01.devnvi.paygoint.com", "clientmac": "0a3ab18031e1", "filehash": "4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9", "filename": "VBCSCompiler.exe", "filepath": "\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"99994fe08640433a925c1d14d7175b2b\",\"timestamp\":\"2023-10-18T15:34:44Z\",\"behavior_id\":\"5737\",\"filename\":\"VBCSCompiler.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\\\" \\\"-pipename:nighthawk.F.Z_dua+xQpvLuzUtnGY1TVjD6x\\\"\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Mumbrellaine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Sensor-based ML\",\"technique_id\":\"CST0007\",\"display_name\":\"Mumbrellaine Learning Identified Medium Confidence Malicious File\",\"description\":\"A file written to the file system meets the on-sensor mumbrellaine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.\",\"severity\":50,\"confidence\":50,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\App_Web_jjafca5y.dll\",\"user_name\":\"nighthawk\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-1290\",\"control_graph_id\":\"ctg:99994fe08640433a925c1d14d7175b2b:77309819454\",\"triggering_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761467075508\",\"sha256\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d\",\"parent_md5\":\"7dc642657b7cb790d687332f6d18feae\",\"parent_cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\csc.exe\\\" /shared /keepalive:\\\"10\\\" /noconfig /fullpaths @\\\"C:\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\uprfi4r5.cmdline\\\"\",\"parent_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761464850144\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=110.230.190.166 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-10-18T15:34:44Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "110.230.190.166", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:nighthawk.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mumbrellaine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mumbrellaine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mumbrellaine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=110.230.190.166 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:nighthawk.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mumbrellaine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mumbrellaine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mumbrellaine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=110.230.190.166 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVISAASUATWEB01.devnvi.paygoint.com clientmac: 0a3ab18031e1 filehash: 4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 filename: VBCSCompiler.exe filepath: \Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-10-18T15:34:44Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 110.230.190.166 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:johndoe.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mstarkine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mstarkine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mstarkine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=156.159.216.143 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVISAASUATWEB01.devnvi.paygoint.com", "clientmac": "0a3ab18031e1", "filehash": "4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9", "filename": "VBCSCompiler.exe", "filepath": "\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"99994fe08640433a925c1d14d7175b2b\",\"timestamp\":\"2023-10-18T15:34:44Z\",\"behavior_id\":\"5737\",\"filename\":\"VBCSCompiler.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\\\" \\\"-pipename:johndoe.F.Z_dua+xQpvLuzUtnGY1TVjD6x\\\"\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Mstarkine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Sensor-based ML\",\"technique_id\":\"CST0007\",\"display_name\":\"Mstarkine Learning Identified Medium Confidence Malicious File\",\"description\":\"A file written to the file system meets the on-sensor mstarkine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.\",\"severity\":50,\"confidence\":50,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\App_Web_jjafca5y.dll\",\"user_name\":\"johndoe\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-1290\",\"control_graph_id\":\"ctg:99994fe08640433a925c1d14d7175b2b:77309819454\",\"triggering_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761467075508\",\"sha256\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d\",\"parent_md5\":\"7dc642657b7cb790d687332f6d18feae\",\"parent_cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\csc.exe\\\" /shared /keepalive:\\\"10\\\" /noconfig /fullpaths @\\\"C:\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\uprfi4r5.cmdline\\\"\",\"parent_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761464850144\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=156.159.216.143 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.starkint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-10-18T15:34:44Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "156.159.216.143", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:johndoe.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mstarkine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mstarkine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mstarkine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=156.159.216.143 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:johndoe.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mstarkine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mstarkine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mstarkine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=156.159.216.143 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVISAASUATWEB01.devnvi.paygoint.com clientmac: 0a3ab18031e1 filehash: 4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 filename: VBCSCompiler.exe filepath: \Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-10-18T15:34:44Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 156.159.216.143 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:alice.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mwayneine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mwayneine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=100.140.169.26 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=alice ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVISAASUATWEB01.devnvi.paygoint.com", "clientmac": "0a3ab18031e1", "filehash": "4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9", "filename": "VBCSCompiler.exe", "filepath": "\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"99994fe08640433a925c1d14d7175b2b\",\"timestamp\":\"2023-10-18T15:34:44Z\",\"behavior_id\":\"5737\",\"filename\":\"VBCSCompiler.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\\\" \\\"-pipename:alice.F.Z_dua+xQpvLuzUtnGY1TVjD6x\\\"\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Mwayneine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Sensor-based ML\",\"technique_id\":\"CST0007\",\"display_name\":\"Mwayneine Learning Identified Medium Confidence Malicious File\",\"description\":\"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.\",\"severity\":50,\"confidence\":50,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\App_Web_jjafca5y.dll\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-1290\",\"control_graph_id\":\"ctg:99994fe08640433a925c1d14d7175b2b:77309819454\",\"triggering_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761467075508\",\"sha256\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d\",\"parent_md5\":\"7dc642657b7cb790d687332f6d18feae\",\"parent_cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\csc.exe\\\" /shared /keepalive:\\\"10\\\" /noconfig /fullpaths @\\\"C:\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\uprfi4r5.cmdline\\\"\",\"parent_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761464850144\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=100.140.169.26 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe ::: userName=alice ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-10-18T15:34:44Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "100.140.169.26", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:alice.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mwayneine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mwayneine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=100.140.169.26 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=alice ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:alice.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mwayneine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mwayneine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=100.140.169.26 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=alice ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVISAASUATWEB01.devnvi.paygoint.com clientmac: 0a3ab18031e1 filehash: 4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 filename: VBCSCompiler.exe filepath: \Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-10-18T15:34:44Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 100.140.169.26 userName: alice
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=52.245.56.17 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf", "filename": "reg.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\reg.exe\\\" QUERY HKLM /F password /t REG_SZ /S /K\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"nighthawk\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=52.245.56.17 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T16:44:43Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "52.245.56.17", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=52.245.56.17 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=52.245.56.17 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf filename: reg.exe filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T16:44:43Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 52.245.56.17 userName: nighthawk
Explain this syslog message