input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"45.10.82.240","externalIp":"30.155.12.114","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=45.10.82.240 ::: serverIP=30.155.12.114 ::: userName=nighthawk ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"45.10.82.240","externalIp":"30.155.12.114","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=45.10.82.240 ::: serverIP=30.155.12.114 ::: userName=nighthawk ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cambbek.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cambbek.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-25T18:07:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Phishing
streamName: OpenDNS Detection
clientIP: 45.10.82.240
serverIP: 30.155.12.114
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"122.73.230.149","externalIp":"164.15.58.189","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=122.73.230.149 ::: serverIP=164.15.58.189 ::: userName=alice ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cambbek.com",
"message": "WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"122.73.230.149\",\"externalIp\":\"164.15.58.189\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"cambbek.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T18:07:49.000Z\"} ::: clientIP=122.73.230.149 ::: serverIP=164.15.58.189 ::: userName=alice ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cambbek.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-25T18:07:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Phishing",
"streamName": "OpenDNS Detection",
"clientIP": "122.73.230.149",
"serverIP": "164.15.58.189",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"122.73.230.149","externalIp":"164.15.58.189","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=122.73.230.149 ::: serverIP=164.15.58.189 ::: userName=alice ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"122.73.230.149","externalIp":"164.15.58.189","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=122.73.230.149 ::: serverIP=164.15.58.189 ::: userName=alice ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cambbek.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cambbek.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-25T18:07:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Phishing
streamName: OpenDNS Detection
clientIP: 122.73.230.149
serverIP: 164.15.58.189
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"219.176.62.6","externalIp":"73.33.205.52","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=219.176.62.6 ::: serverIP=73.33.205.52 ::: userName=bob ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "fructed-vulgarizers-mixology.click",
"message": "WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"219.176.62.6\",\"externalIp\":\"73.33.205.52\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"fructed-vulgarizers-mixology.click\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T10:40:30.000Z\"} ::: clientIP=219.176.62.6 ::: serverIP=73.33.205.52 ::: userName=bob ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "fructed-vulgarizers-mixology.click",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-25T10:40:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "219.176.62.6",
"serverIP": "73.33.205.52",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"219.176.62.6","externalIp":"73.33.205.52","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=219.176.62.6 ::: serverIP=73.33.205.52 ::: userName=bob ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"219.176.62.6","externalIp":"73.33.205.52","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=219.176.62.6 ::: serverIP=73.33.205.52 ::: userName=bob ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: fructed-vulgarizers-mixology.click
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: fructed-vulgarizers-mixology.click
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-25T10:40:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 219.176.62.6
serverIP: 73.33.205.52
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"121.61.152.90","externalIp":"4.51.94.164","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=121.61.152.90 ::: serverIP=4.51.94.164 ::: userName=charlie ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "fructed-vulgarizers-mixology.click",
"message": "WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"121.61.152.90\",\"externalIp\":\"4.51.94.164\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"fructed-vulgarizers-mixology.click\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T10:40:30.000Z\"} ::: clientIP=121.61.152.90 ::: serverIP=4.51.94.164 ::: userName=charlie ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "fructed-vulgarizers-mixology.click",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-25T10:40:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "121.61.152.90",
"serverIP": "4.51.94.164",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"121.61.152.90","externalIp":"4.51.94.164","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=121.61.152.90 ::: serverIP=4.51.94.164 ::: userName=charlie ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"121.61.152.90","externalIp":"4.51.94.164","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=121.61.152.90 ::: serverIP=4.51.94.164 ::: userName=charlie ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: fructed-vulgarizers-mixology.click
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: fructed-vulgarizers-mixology.click
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-25T10:40:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 121.61.152.90
serverIP: 4.51.94.164
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"215.195.193.97","externalIp":"151.231.57.97","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=215.195.193.97 ::: serverIP=151.231.57.97 ::: userName=alice ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cambbek.com",
"message": "WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"215.195.193.97\",\"externalIp\":\"151.231.57.97\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"cambbek.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T18:07:49.000Z\"} ::: clientIP=215.195.193.97 ::: serverIP=151.231.57.97 ::: userName=alice ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cambbek.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-25T18:07:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Phishing",
"streamName": "OpenDNS Detection",
"clientIP": "215.195.193.97",
"serverIP": "151.231.57.97",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"215.195.193.97","externalIp":"151.231.57.97","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=215.195.193.97 ::: serverIP=151.231.57.97 ::: userName=alice ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"215.195.193.97","externalIp":"151.231.57.97","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=215.195.193.97 ::: serverIP=151.231.57.97 ::: userName=alice ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cambbek.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cambbek.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-25T18:07:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Phishing
streamName: OpenDNS Detection
clientIP: 215.195.193.97
serverIP: 151.231.57.97
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"60.202.83.54","externalIp":"70.91.12.83","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=60.202.83.54 ::: serverIP=70.91.12.83 ::: userName=charlie ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "cambbek.com",
"message": "WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"60.202.83.54\",\"externalIp\":\"70.91.12.83\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"cambbek.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T18:07:49.000Z\"} ::: clientIP=60.202.83.54 ::: serverIP=70.91.12.83 ::: userName=charlie ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "cambbek.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-25T18:07:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Phishing",
"streamName": "OpenDNS Detection",
"clientIP": "60.202.83.54",
"serverIP": "70.91.12.83",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"60.202.83.54","externalIp":"70.91.12.83","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=60.202.83.54 ::: serverIP=70.91.12.83 ::: userName=charlie ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"60.202.83.54","externalIp":"70.91.12.83","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=60.202.83.54 ::: serverIP=70.91.12.83 ::: userName=charlie ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: cambbek.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: cambbek.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-25T18:07:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Phishing
streamName: OpenDNS Detection
clientIP: 60.202.83.54
serverIP: 70.91.12.83
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"acme_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attacmeed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"19.207.130.183","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=19.207.130.183 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=19.207.130.183 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "bsuznvdosnx@gmail.com",
"emailsendingserver": "209.85.217.51",
"emailsubject": "Account Debit Notification: Your account has been debited",
"filehash": "<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>",
"filename": "from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatStatus\":\"active\",\"classification\":\"toad\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatTime\":\"2023-08-28T15:46:01.000Z\",\"threat\":\"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"campaignID\":null,\"threatType\":\"messageText\"}],\"messageTime\":\"2023-08-28T15:46:01.000Z\",\"impostorScore\":0,\"malwareScore\":100,\"cluster\":\"acme_hosted\",\"subject\":\"Account Debit Notification: Your account has been debited\",\"quarantineFolder\":\"Malware\",\"quarantineRule\":\"inbound_malware\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":345948,\"headerFrom\":\"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"bsuznvdosnx@gmail.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"mnavarro@sandiegoprivatebank.net\"],\"xmailer\":\"Microsoft CDO for Windows 2000\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278\",\"md5\":\"7705448f293829edc918691974a3b101\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attacmeed\",\"sha256\":\"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c\",\"md5\":\"0293037179e96ace279d9de797c7f4cc\",\"filename\":\"ame491thk.pdf\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/pdf\",\"contentType\":\"application/pdf\"}],\"completelyRewritten\":false,\"id\":\"e85654e8-1a59-0215-27ba-032291cb7703\",\"QID\":\"3sqd8rgqt8-1\",\"GUID\":\"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"sender\":\"bsuznvdosnx@gmail.com\",\"recipient\":[\"mnavarro@sandiegoprivatebank.net\"],\"senderIP\":\"19.207.130.183\",\"messageID\":\"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>\"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=19.207.130.183 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=19.207.130.183 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-28T15:46:01.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "19.207.130.183"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"acme_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attacmeed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"19.207.130.183","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=19.207.130.183 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=19.207.130.183 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"acme_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attacmeed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"19.207.130.183","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=19.207.130.183 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=19.207.130.183 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: bsuznvdosnx@gmail.com
emailsendingserver: 209.85.217.51
emailsubject: Account Debit Notification: Your account has been debited
filehash: <2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>
filename: from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-08-28T15:46:01.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 19.207.130.183 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"oscorp_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"131.99.118.137","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=131.99.118.137 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=131.99.118.137 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "bsuznvdosnx@gmail.com",
"emailsendingserver": "209.85.217.51",
"emailsubject": "Account Debit Notification: Your account has been debited",
"filehash": "<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>",
"filename": "from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatStatus\":\"active\",\"classification\":\"toad\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatTime\":\"2023-08-28T15:46:01.000Z\",\"threat\":\"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"campaignID\":null,\"threatType\":\"messageText\"}],\"messageTime\":\"2023-08-28T15:46:01.000Z\",\"impostorScore\":0,\"malwareScore\":100,\"cluster\":\"oscorp_hosted\",\"subject\":\"Account Debit Notification: Your account has been debited\",\"quarantineFolder\":\"Malware\",\"quarantineRule\":\"inbound_malware\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":345948,\"headerFrom\":\"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"bsuznvdosnx@gmail.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"mnavarro@sandiegoprivatebank.net\"],\"xmailer\":\"Microsoft CDO for Windows 2000\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278\",\"md5\":\"7705448f293829edc918691974a3b101\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attoscorped\",\"sha256\":\"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c\",\"md5\":\"0293037179e96ace279d9de797c7f4cc\",\"filename\":\"ame491thk.pdf\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/pdf\",\"contentType\":\"application/pdf\"}],\"completelyRewritten\":false,\"id\":\"e85654e8-1a59-0215-27ba-032291cb7703\",\"QID\":\"3sqd8rgqt8-1\",\"GUID\":\"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"sender\":\"bsuznvdosnx@gmail.com\",\"recipient\":[\"mnavarro@sandiegoprivatebank.net\"],\"senderIP\":\"131.99.118.137\",\"messageID\":\"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>\"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=131.99.118.137 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=131.99.118.137 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-28T15:46:01.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "131.99.118.137"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"oscorp_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"131.99.118.137","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=131.99.118.137 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=131.99.118.137 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"oscorp_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"131.99.118.137","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=131.99.118.137 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=131.99.118.137 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: bsuznvdosnx@gmail.com
emailsendingserver: 209.85.217.51
emailsubject: Account Debit Notification: Your account has been debited
filehash: <2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>
filename: from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-08-28T15:46:01.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 131.99.118.137 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"acme_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attacmeed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"114.39.41.31","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=114.39.41.31 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=114.39.41.31 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "bsuznvdosnx@gmail.com",
"emailsendingserver": "209.85.217.51",
"emailsubject": "Account Debit Notification: Your account has been debited",
"filehash": "<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>",
"filename": "from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatStatus\":\"active\",\"classification\":\"toad\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatTime\":\"2023-08-28T15:46:01.000Z\",\"threat\":\"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"campaignID\":null,\"threatType\":\"messageText\"}],\"messageTime\":\"2023-08-28T15:46:01.000Z\",\"impostorScore\":0,\"malwareScore\":100,\"cluster\":\"acme_hosted\",\"subject\":\"Account Debit Notification: Your account has been debited\",\"quarantineFolder\":\"Malware\",\"quarantineRule\":\"inbound_malware\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":345948,\"headerFrom\":\"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"bsuznvdosnx@gmail.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"mnavarro@sandiegoprivatebank.net\"],\"xmailer\":\"Microsoft CDO for Windows 2000\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278\",\"md5\":\"7705448f293829edc918691974a3b101\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attacmeed\",\"sha256\":\"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c\",\"md5\":\"0293037179e96ace279d9de797c7f4cc\",\"filename\":\"ame491thk.pdf\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/pdf\",\"contentType\":\"application/pdf\"}],\"completelyRewritten\":false,\"id\":\"e85654e8-1a59-0215-27ba-032291cb7703\",\"QID\":\"3sqd8rgqt8-1\",\"GUID\":\"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"sender\":\"bsuznvdosnx@gmail.com\",\"recipient\":[\"mnavarro@sandiegoprivatebank.net\"],\"senderIP\":\"114.39.41.31\",\"messageID\":\"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>\"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=114.39.41.31 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=114.39.41.31 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-28T15:46:01.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "114.39.41.31"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"acme_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attacmeed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"114.39.41.31","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=114.39.41.31 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=114.39.41.31 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"acme_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attacmeed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"114.39.41.31","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=114.39.41.31 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=114.39.41.31 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: bsuznvdosnx@gmail.com
emailsendingserver: 209.85.217.51
emailsubject: Account Debit Notification: Your account has been debited
filehash: <2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>
filename: from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-08-28T15:46:01.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 114.39.41.31 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"stark_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"85.67.208.139","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=85.67.208.139 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=85.67.208.139 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "bsuznvdosnx@gmail.com",
"emailsendingserver": "209.85.217.51",
"emailsubject": "Account Debit Notification: Your account has been debited",
"filehash": "<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>",
"filename": "from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatStatus\":\"active\",\"classification\":\"toad\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatTime\":\"2023-08-28T15:46:01.000Z\",\"threat\":\"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"campaignID\":null,\"threatType\":\"messageText\"}],\"messageTime\":\"2023-08-28T15:46:01.000Z\",\"impostorScore\":0,\"malwareScore\":100,\"cluster\":\"stark_hosted\",\"subject\":\"Account Debit Notification: Your account has been debited\",\"quarantineFolder\":\"Malware\",\"quarantineRule\":\"inbound_malware\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":345948,\"headerFrom\":\"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"bsuznvdosnx@gmail.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"mnavarro@sandiegoprivatebank.net\"],\"xmailer\":\"Microsoft CDO for Windows 2000\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278\",\"md5\":\"7705448f293829edc918691974a3b101\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attstarked\",\"sha256\":\"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c\",\"md5\":\"0293037179e96ace279d9de797c7f4cc\",\"filename\":\"ame491thk.pdf\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/pdf\",\"contentType\":\"application/pdf\"}],\"completelyRewritten\":false,\"id\":\"e85654e8-1a59-0215-27ba-032291cb7703\",\"QID\":\"3sqd8rgqt8-1\",\"GUID\":\"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"sender\":\"bsuznvdosnx@gmail.com\",\"recipient\":[\"mnavarro@sandiegoprivatebank.net\"],\"senderIP\":\"85.67.208.139\",\"messageID\":\"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>\"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=85.67.208.139 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=85.67.208.139 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-28T15:46:01.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "85.67.208.139"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"stark_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"85.67.208.139","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=85.67.208.139 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=85.67.208.139 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"stark_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"85.67.208.139","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=85.67.208.139 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=85.67.208.139 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: bsuznvdosnx@gmail.com
emailsendingserver: 209.85.217.51
emailsubject: Account Debit Notification: Your account has been debited
filehash: <2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>
filename: from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-08-28T15:46:01.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 85.67.208.139 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"wayne_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"134.27.117.67","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=134.27.117.67 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=134.27.117.67 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "bsuznvdosnx@gmail.com",
"emailsendingserver": "209.85.217.51",
"emailsubject": "Account Debit Notification: Your account has been debited",
"filehash": "<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>",
"filename": "from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatStatus\":\"active\",\"classification\":\"toad\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatTime\":\"2023-08-28T15:46:01.000Z\",\"threat\":\"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"campaignID\":null,\"threatType\":\"messageText\"}],\"messageTime\":\"2023-08-28T15:46:01.000Z\",\"impostorScore\":0,\"malwareScore\":100,\"cluster\":\"wayne_hosted\",\"subject\":\"Account Debit Notification: Your account has been debited\",\"quarantineFolder\":\"Malware\",\"quarantineRule\":\"inbound_malware\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":345948,\"headerFrom\":\"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"bsuznvdosnx@gmail.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"mnavarro@sandiegoprivatebank.net\"],\"xmailer\":\"Microsoft CDO for Windows 2000\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278\",\"md5\":\"7705448f293829edc918691974a3b101\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attwayneed\",\"sha256\":\"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c\",\"md5\":\"0293037179e96ace279d9de797c7f4cc\",\"filename\":\"ame491thk.pdf\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/pdf\",\"contentType\":\"application/pdf\"}],\"completelyRewritten\":false,\"id\":\"e85654e8-1a59-0215-27ba-032291cb7703\",\"QID\":\"3sqd8rgqt8-1\",\"GUID\":\"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"sender\":\"bsuznvdosnx@gmail.com\",\"recipient\":[\"mnavarro@sandiegoprivatebank.net\"],\"senderIP\":\"134.27.117.67\",\"messageID\":\"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>\"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=134.27.117.67 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=134.27.117.67 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-28T15:46:01.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "134.27.117.67"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"wayne_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"134.27.117.67","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=134.27.117.67 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=134.27.117.67 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"wayne_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"134.27.117.67","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=134.27.117.67 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=134.27.117.67 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: bsuznvdosnx@gmail.com
emailsendingserver: 209.85.217.51
emailsubject: Account Debit Notification: Your account has been debited
filehash: <2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>
filename: from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-08-28T15:46:01.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 134.27.117.67 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"umbrella_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attumbrellaed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"141.132.24.167","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=141.132.24.167 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=141.132.24.167 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "bsuznvdosnx@gmail.com",
"emailsendingserver": "209.85.217.51",
"emailsubject": "Account Debit Notification: Your account has been debited",
"filehash": "<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>",
"filename": "from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatStatus\":\"active\",\"classification\":\"toad\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatTime\":\"2023-08-28T15:46:01.000Z\",\"threat\":\"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"campaignID\":null,\"threatType\":\"messageText\"}],\"messageTime\":\"2023-08-28T15:46:01.000Z\",\"impostorScore\":0,\"malwareScore\":100,\"cluster\":\"umbrella_hosted\",\"subject\":\"Account Debit Notification: Your account has been debited\",\"quarantineFolder\":\"Malware\",\"quarantineRule\":\"inbound_malware\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":345948,\"headerFrom\":\"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"bsuznvdosnx@gmail.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"mnavarro@sandiegoprivatebank.net\"],\"xmailer\":\"Microsoft CDO for Windows 2000\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278\",\"md5\":\"7705448f293829edc918691974a3b101\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c\",\"md5\":\"0293037179e96ace279d9de797c7f4cc\",\"filename\":\"ame491thk.pdf\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/pdf\",\"contentType\":\"application/pdf\"}],\"completelyRewritten\":false,\"id\":\"e85654e8-1a59-0215-27ba-032291cb7703\",\"QID\":\"3sqd8rgqt8-1\",\"GUID\":\"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"sender\":\"bsuznvdosnx@gmail.com\",\"recipient\":[\"mnavarro@sandiegoprivatebank.net\"],\"senderIP\":\"141.132.24.167\",\"messageID\":\"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>\"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=141.132.24.167 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=141.132.24.167 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-28T15:46:01.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "141.132.24.167"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"umbrella_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attumbrellaed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"141.132.24.167","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=141.132.24.167 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=141.132.24.167 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"umbrella_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attumbrellaed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"141.132.24.167","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=141.132.24.167 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=141.132.24.167 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: bsuznvdosnx@gmail.com
emailsendingserver: 209.85.217.51
emailsubject: Account Debit Notification: Your account has been debited
filehash: <2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>
filename: from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-08-28T15:46:01.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 141.132.24.167 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"oscorp_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"32.189.47.63","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=32.189.47.63 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=32.189.47.63 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "bsuznvdosnx@gmail.com",
"emailsendingserver": "209.85.217.51",
"emailsubject": "Account Debit Notification: Your account has been debited",
"filehash": "<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>",
"filename": "from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatStatus\":\"active\",\"classification\":\"toad\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatTime\":\"2023-08-28T15:46:01.000Z\",\"threat\":\"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"campaignID\":null,\"threatType\":\"messageText\"}],\"messageTime\":\"2023-08-28T15:46:01.000Z\",\"impostorScore\":0,\"malwareScore\":100,\"cluster\":\"oscorp_hosted\",\"subject\":\"Account Debit Notification: Your account has been debited\",\"quarantineFolder\":\"Malware\",\"quarantineRule\":\"inbound_malware\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":345948,\"headerFrom\":\"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"bsuznvdosnx@gmail.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"mnavarro@sandiegoprivatebank.net\"],\"xmailer\":\"Microsoft CDO for Windows 2000\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278\",\"md5\":\"7705448f293829edc918691974a3b101\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attoscorped\",\"sha256\":\"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c\",\"md5\":\"0293037179e96ace279d9de797c7f4cc\",\"filename\":\"ame491thk.pdf\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/pdf\",\"contentType\":\"application/pdf\"}],\"completelyRewritten\":false,\"id\":\"e85654e8-1a59-0215-27ba-032291cb7703\",\"QID\":\"3sqd8rgqt8-1\",\"GUID\":\"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"sender\":\"bsuznvdosnx@gmail.com\",\"recipient\":[\"mnavarro@sandiegoprivatebank.net\"],\"senderIP\":\"32.189.47.63\",\"messageID\":\"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>\"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=32.189.47.63 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=32.189.47.63 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-28T15:46:01.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "32.189.47.63"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"oscorp_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"32.189.47.63","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=32.189.47.63 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=32.189.47.63 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"oscorp_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"32.189.47.63","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=32.189.47.63 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=32.189.47.63 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: bsuznvdosnx@gmail.com
emailsendingserver: 209.85.217.51
emailsubject: Account Debit Notification: Your account has been debited
filehash: <2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>
filename: from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-08-28T15:46:01.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 32.189.47.63 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"stark_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"152.175.184.83","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=152.175.184.83 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=152.175.184.83 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "bsuznvdosnx@gmail.com",
"emailsendingserver": "209.85.217.51",
"emailsubject": "Account Debit Notification: Your account has been debited",
"filehash": "<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>",
"filename": "from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatStatus\":\"active\",\"classification\":\"toad\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatTime\":\"2023-08-28T15:46:01.000Z\",\"threat\":\"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"campaignID\":null,\"threatType\":\"messageText\"}],\"messageTime\":\"2023-08-28T15:46:01.000Z\",\"impostorScore\":0,\"malwareScore\":100,\"cluster\":\"stark_hosted\",\"subject\":\"Account Debit Notification: Your account has been debited\",\"quarantineFolder\":\"Malware\",\"quarantineRule\":\"inbound_malware\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":345948,\"headerFrom\":\"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"bsuznvdosnx@gmail.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"mnavarro@sandiegoprivatebank.net\"],\"xmailer\":\"Microsoft CDO for Windows 2000\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278\",\"md5\":\"7705448f293829edc918691974a3b101\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attstarked\",\"sha256\":\"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c\",\"md5\":\"0293037179e96ace279d9de797c7f4cc\",\"filename\":\"ame491thk.pdf\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/pdf\",\"contentType\":\"application/pdf\"}],\"completelyRewritten\":false,\"id\":\"e85654e8-1a59-0215-27ba-032291cb7703\",\"QID\":\"3sqd8rgqt8-1\",\"GUID\":\"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"sender\":\"bsuznvdosnx@gmail.com\",\"recipient\":[\"mnavarro@sandiegoprivatebank.net\"],\"senderIP\":\"152.175.184.83\",\"messageID\":\"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>\"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=152.175.184.83 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=152.175.184.83 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-28T15:46:01.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "152.175.184.83"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"stark_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"152.175.184.83","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=152.175.184.83 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=152.175.184.83 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"stark_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"152.175.184.83","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=152.175.184.83 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=152.175.184.83 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: bsuznvdosnx@gmail.com
emailsendingserver: 209.85.217.51
emailsubject: Account Debit Notification: Your account has been debited
filehash: <2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>
filename: from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-08-28T15:46:01.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 152.175.184.83 | Explain this syslog message |
<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=224.40.131.47 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=133.191.36.120 spt=33354 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=133.191.36.120 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 33354,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1694087617269 ",
"message": "<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=224.40.131.47 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=133.191.36.120 spt=33354 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication=\"Hello World\" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=133.191.36.120 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:185.224.128.142",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "133.191.36.120",
"serverIP": "224.40.131.47",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=224.40.131.47 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=133.191.36.120 spt=33354 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=133.191.36.120 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=224.40.131.47 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=133.191.36.120 spt=33354 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=133.191.36.120 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 33354
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1694087617269
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.224.128.142', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 133.191.36.120
serverIP: 224.40.131.47
userName: - | Explain this syslog message |
<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=222.241.24.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=99.124.109.224 spt=33354 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=99.124.109.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 33354,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1694087617269 ",
"message": "<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=222.241.24.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=99.124.109.224 spt=33354 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication=\"Hello World\" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=99.124.109.224 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:185.224.128.142",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "99.124.109.224",
"serverIP": "222.241.24.66",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=222.241.24.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=99.124.109.224 spt=33354 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=99.124.109.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=222.241.24.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=99.124.109.224 spt=33354 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=99.124.109.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 33354
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1694087617269
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.224.128.142', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 99.124.109.224
serverIP: 222.241.24.66
userName: - | Explain this syslog message |
<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=19.2.63.69 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=197.96.36.116 spt=33354 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=197.96.36.116 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 33354,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1694087617269 ",
"message": "<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=19.2.63.69 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=197.96.36.116 spt=33354 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication=\"Hello World\" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=197.96.36.116 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:185.224.128.142",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "197.96.36.116",
"serverIP": "19.2.63.69",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=19.2.63.69 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=197.96.36.116 spt=33354 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=197.96.36.116 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=19.2.63.69 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=197.96.36.116 spt=33354 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=197.96.36.116 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 33354
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1694087617269
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.224.128.142', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 197.96.36.116
serverIP: 19.2.63.69
userName: - | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t158.128.178.171\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"158.128.178.171","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}} | {
"action": "Logon",
"clientport": 64053,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-08-25T15:03:44.870Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-08-25T15:03:46.231Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t158.128.178.171\\n\\tSource Port:\\t\\t64053\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"158.128.178.171\",\"IpPort\":\"64053\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":2060}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6252454048,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6252454048",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "158.128.178.171",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t158.128.178.171\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"158.128.178.171","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t158.128.178.171\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"158.128.178.171","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 64053
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6252454048
streamName: microsoft-windows-security-auditing
clientIP: 158.128.178.171
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t248.93.72.53\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"248.93.72.53","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}} | {
"action": "Logon",
"clientport": 64053,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-08-25T15:03:44.870Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-08-25T15:03:46.231Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t248.93.72.53\\n\\tSource Port:\\t\\t64053\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"248.93.72.53\",\"IpPort\":\"64053\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":2060}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6252454048,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6252454048",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "248.93.72.53",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t248.93.72.53\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"248.93.72.53","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t248.93.72.53\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"248.93.72.53","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 64053
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6252454048
streamName: microsoft-windows-security-auditing
clientIP: 248.93.72.53
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t15.87.21.16\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"15.87.21.16","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}} | {
"action": "Logon",
"clientport": 64053,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-08-25T15:03:44.870Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-08-25T15:03:46.231Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t15.87.21.16\\n\\tSource Port:\\t\\t64053\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"15.87.21.16\",\"IpPort\":\"64053\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":2060}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6252454048,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6252454048",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "15.87.21.16",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t15.87.21.16\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"15.87.21.16","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t15.87.21.16\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"15.87.21.16","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 64053
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6252454048
streamName: microsoft-windows-security-auditing
clientIP: 15.87.21.16
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t226.63.145.233\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"226.63.145.233","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}} | {
"action": "Logon",
"clientport": 64053,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-08-25T15:03:44.870Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-08-25T15:03:46.231Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t226.63.145.233\\n\\tSource Port:\\t\\t64053\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"226.63.145.233\",\"IpPort\":\"64053\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":2060}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6252454048,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6252454048",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "226.63.145.233",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t226.63.145.233\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"226.63.145.233","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t226.63.145.233\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"226.63.145.233","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 64053
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6252454048
streamName: microsoft-windows-security-auditing
clientIP: 226.63.145.233
userName: janedoe | Explain this syslog message |
<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=196.153.198.26 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=83.243.0.132 spt=47390 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.243.0.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:87.250.224.53",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=196.153.198.26 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=83.243.0.132 spt=47390 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)\" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.243.0.132 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1676479504722 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/robots.txt",
"clientport": 47390,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "83.243.0.132",
"serverIP": "196.153.198.26",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=196.153.198.26 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=83.243.0.132 spt=47390 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.243.0.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=196.153.198.26 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=83.243.0.132 spt=47390 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.243.0.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:87.250.224.53', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1676479504722
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /robots.txt
clientport: 47390
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 83.243.0.132
serverIP: 196.153.198.26
userName: - | Explain this syslog message |
<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=91.65.134.53 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=55.217.200.116 spt=47390 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.217.200.116 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:87.250.224.53",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=91.65.134.53 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=55.217.200.116 spt=47390 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)\" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.217.200.116 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1676479504722 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/robots.txt",
"clientport": 47390,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "55.217.200.116",
"serverIP": "91.65.134.53",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=91.65.134.53 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=55.217.200.116 spt=47390 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.217.200.116 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=91.65.134.53 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=55.217.200.116 spt=47390 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.217.200.116 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:87.250.224.53', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1676479504722
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /robots.txt
clientport: 47390
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 55.217.200.116
serverIP: 91.65.134.53
userName: - | Explain this syslog message |
<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=150.152.161.192 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=71.42.185.16 spt=47390 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.42.185.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:87.250.224.53",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=150.152.161.192 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=71.42.185.16 spt=47390 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)\" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.42.185.16 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1676479504722 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/robots.txt",
"clientport": 47390,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "71.42.185.16",
"serverIP": "150.152.161.192",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=150.152.161.192 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=71.42.185.16 spt=47390 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.42.185.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=150.152.161.192 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=71.42.185.16 spt=47390 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.42.185.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:87.250.224.53', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1676479504722
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /robots.txt
clientport: 47390
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 71.42.185.16
serverIP: 150.152.161.192
userName: - | Explain this syslog message |
<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=86.156.180.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=170.92.165.139 spt=48922 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.92.165.139 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:87.250.224.53",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=86.156.180.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=170.92.165.139 spt=48922 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication=\"Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)\" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.92.165.139 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1676479508529 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/Volunteer/VolOpInfo.jsp",
"clientport": 48922,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "170.92.165.139",
"serverIP": "86.156.180.16",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=86.156.180.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=170.92.165.139 spt=48922 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.92.165.139 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=86.156.180.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=170.92.165.139 spt=48922 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.92.165.139 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:87.250.224.53', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1676479508529
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /Volunteer/VolOpInfo.jsp
clientport: 48922
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 170.92.165.139
serverIP: 86.156.180.16
userName: - | Explain this syslog message |
<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.162.217.176 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=98.39.85.4 spt=48922 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=98.39.85.4 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:87.250.224.53",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.162.217.176 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=98.39.85.4 spt=48922 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication=\"Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)\" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=98.39.85.4 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1676479508529 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/Volunteer/VolOpInfo.jsp",
"clientport": 48922,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "98.39.85.4",
"serverIP": "224.162.217.176",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.162.217.176 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=98.39.85.4 spt=48922 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=98.39.85.4 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.162.217.176 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=98.39.85.4 spt=48922 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=98.39.85.4 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:87.250.224.53', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1676479508529
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /Volunteer/VolOpInfo.jsp
clientport: 48922
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 98.39.85.4
serverIP: 224.162.217.176
userName: - | Explain this syslog message |
<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=214.228.121.0 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.42.253.25 spt=48922 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.42.253.25 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:87.250.224.53",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=214.228.121.0 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=131.42.253.25 spt=48922 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication=\"Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)\" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.42.253.25 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1676479508529 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/Volunteer/VolOpInfo.jsp",
"clientport": 48922,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "131.42.253.25",
"serverIP": "214.228.121.0",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=214.228.121.0 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.42.253.25 spt=48922 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.42.253.25 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=214.228.121.0 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.42.253.25 spt=48922 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.42.253.25 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:87.250.224.53', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1676479508529
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /Volunteer/VolOpInfo.jsp
clientport: 48922
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 131.42.253.25
serverIP: 214.228.121.0
userName: - | Explain this syslog message |
<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=46.239.45.101 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=0.96.41.111 spt=53258 requestMethod=GET app=HTTP requestContext="-" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.96.41.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53258,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1692632498285 ",
"message": "<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=46.239.45.101 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=0.96.41.111 spt=53258 requestMethod=GET app=HTTP requestContext=\"-\" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.96.41.111 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:83.97.73.87",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "0.96.41.111",
"serverIP": "46.239.45.101",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=46.239.45.101 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=0.96.41.111 spt=53258 requestMethod=GET app=HTTP requestContext="-" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.96.41.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=46.239.45.101 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=0.96.41.111 spt=53258 requestMethod=GET app=HTTP requestContext="-" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.96.41.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53258
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1692632498285
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:83.97.73.87', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 0.96.41.111
serverIP: 46.239.45.101
userName: - | Explain this syslog message |
<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=205.141.233.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=28.68.99.163 spt=53258 requestMethod=GET app=HTTP requestContext="-" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.68.99.163 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53258,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1692632498285 ",
"message": "<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=205.141.233.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=28.68.99.163 spt=53258 requestMethod=GET app=HTTP requestContext=\"-\" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.68.99.163 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:83.97.73.87",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "28.68.99.163",
"serverIP": "205.141.233.128",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=205.141.233.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=28.68.99.163 spt=53258 requestMethod=GET app=HTTP requestContext="-" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.68.99.163 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=205.141.233.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=28.68.99.163 spt=53258 requestMethod=GET app=HTTP requestContext="-" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.68.99.163 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53258
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1692632498285
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:83.97.73.87', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 28.68.99.163
serverIP: 205.141.233.128
userName: - | Explain this syslog message |
<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=126.212.142.73 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=253.59.253.157 spt=53258 requestMethod=GET app=HTTP requestContext="-" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.59.253.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53258,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1692632498285 ",
"message": "<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=126.212.142.73 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=253.59.253.157 spt=53258 requestMethod=GET app=HTTP requestContext=\"-\" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.59.253.157 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:83.97.73.87",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "253.59.253.157",
"serverIP": "126.212.142.73",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=126.212.142.73 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=253.59.253.157 spt=53258 requestMethod=GET app=HTTP requestContext="-" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.59.253.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=126.212.142.73 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=253.59.253.157 spt=53258 requestMethod=GET app=HTTP requestContext="-" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.59.253.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53258
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1692632498285
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:83.97.73.87', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 253.59.253.157
serverIP: 126.212.142.73
userName: - | Explain this syslog message |
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=39.252.117.128 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=53.41.216.231 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=53.41.216.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 36108,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/*",
"localhostname": "WAFirewall",
"localstarttime": "1703509558882 ",
"message": "<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=39.252.117.128 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=53.41.216.231 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=53.41.216.231 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "MALFORMED_VERSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_MALFORMED_VERSION",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION",
"SessionID:-",
"ProxyIP:162.142.125.217"
],
"vendorcode": "119",
"streamName": "barracuda_waf",
"clientIP": "53.41.216.231",
"serverIP": "39.252.117.128",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=39.252.117.128 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=53.41.216.231 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=53.41.216.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=39.252.117.128 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=53.41.216.231 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=53.41.216.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 36108
facilitycode: 23
facilitylabel: local7
fqdn: /*
localhostname: WAFirewall
localstarttime: 1703509558882
messagetype: MALFORMED_VERSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'SessionID:-', 'ProxyIP:162.142.125.217']
vendorcode: 119
streamName: barracuda_waf
clientIP: 53.41.216.231
serverIP: 39.252.117.128
userName: - | Explain this syslog message |
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=215.93.254.40 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=91.103.206.200 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=91.103.206.200 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 36108,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/*",
"localhostname": "WAFirewall",
"localstarttime": "1703509558882 ",
"message": "<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=215.93.254.40 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=91.103.206.200 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=91.103.206.200 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "MALFORMED_VERSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_MALFORMED_VERSION",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION",
"SessionID:-",
"ProxyIP:162.142.125.217"
],
"vendorcode": "119",
"streamName": "barracuda_waf",
"clientIP": "91.103.206.200",
"serverIP": "215.93.254.40",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=215.93.254.40 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=91.103.206.200 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=91.103.206.200 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=215.93.254.40 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=91.103.206.200 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=91.103.206.200 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 36108
facilitycode: 23
facilitylabel: local7
fqdn: /*
localhostname: WAFirewall
localstarttime: 1703509558882
messagetype: MALFORMED_VERSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'SessionID:-', 'ProxyIP:162.142.125.217']
vendorcode: 119
streamName: barracuda_waf
clientIP: 91.103.206.200
serverIP: 215.93.254.40
userName: - | Explain this syslog message |
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=112.144.247.157 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=137.191.91.156 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=137.191.91.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 36108,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/*",
"localhostname": "WAFirewall",
"localstarttime": "1703509558882 ",
"message": "<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=112.144.247.157 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=137.191.91.156 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=137.191.91.156 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "MALFORMED_VERSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_MALFORMED_VERSION",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION",
"SessionID:-",
"ProxyIP:162.142.125.217"
],
"vendorcode": "119",
"streamName": "barracuda_waf",
"clientIP": "137.191.91.156",
"serverIP": "112.144.247.157",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=112.144.247.157 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=137.191.91.156 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=137.191.91.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=112.144.247.157 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=137.191.91.156 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=137.191.91.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 36108
facilitycode: 23
facilitylabel: local7
fqdn: /*
localhostname: WAFirewall
localstarttime: 1703509558882
messagetype: MALFORMED_VERSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'SessionID:-', 'ProxyIP:162.142.125.217']
vendorcode: 119
streamName: barracuda_waf
clientIP: 137.191.91.156
serverIP: 112.144.247.157
userName: - | Explain this syslog message |
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=60.63.92.173 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=21.6.188.35 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=21.6.188.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 36108,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/*",
"localhostname": "WAFirewall",
"localstarttime": "1703509558882 ",
"message": "<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=60.63.92.173 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=21.6.188.35 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=21.6.188.35 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "MALFORMED_VERSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_MALFORMED_VERSION",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION",
"SessionID:-",
"ProxyIP:162.142.125.217"
],
"vendorcode": "119",
"streamName": "barracuda_waf",
"clientIP": "21.6.188.35",
"serverIP": "60.63.92.173",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=60.63.92.173 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=21.6.188.35 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=21.6.188.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.