input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"45.10.82.240","externalIp":"30.155.12.114","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=45.10.82.240 ::: serverIP=30.155.12.114 ::: userName=nighthawk ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"45.10.82.240","externalIp":"30.155.12.114","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=45.10.82.240 ::: serverIP=30.155.12.114 ::: userName=nighthawk ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cambbek.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cambbek.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-25T18:07:49.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Phishing streamName: OpenDNS Detection clientIP: 45.10.82.240 serverIP: 30.155.12.114 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"122.73.230.149","externalIp":"164.15.58.189","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=122.73.230.149 ::: serverIP=164.15.58.189 ::: userName=alice ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cambbek.com", "message": "WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"122.73.230.149\",\"externalIp\":\"164.15.58.189\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"cambbek.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T18:07:49.000Z\"} ::: clientIP=122.73.230.149 ::: serverIP=164.15.58.189 ::: userName=alice ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cambbek.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-25T18:07:49.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Phishing", "streamName": "OpenDNS Detection", "clientIP": "122.73.230.149", "serverIP": "164.15.58.189", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"122.73.230.149","externalIp":"164.15.58.189","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=122.73.230.149 ::: serverIP=164.15.58.189 ::: userName=alice ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"122.73.230.149","externalIp":"164.15.58.189","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=122.73.230.149 ::: serverIP=164.15.58.189 ::: userName=alice ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cambbek.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cambbek.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-25T18:07:49.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Phishing streamName: OpenDNS Detection clientIP: 122.73.230.149 serverIP: 164.15.58.189 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"219.176.62.6","externalIp":"73.33.205.52","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=219.176.62.6 ::: serverIP=73.33.205.52 ::: userName=bob ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "fructed-vulgarizers-mixology.click", "message": "WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"219.176.62.6\",\"externalIp\":\"73.33.205.52\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"fructed-vulgarizers-mixology.click\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T10:40:30.000Z\"} ::: clientIP=219.176.62.6 ::: serverIP=73.33.205.52 ::: userName=bob ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "fructed-vulgarizers-mixology.click", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-25T10:40:30.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "219.176.62.6", "serverIP": "73.33.205.52", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"219.176.62.6","externalIp":"73.33.205.52","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=219.176.62.6 ::: serverIP=73.33.205.52 ::: userName=bob ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"219.176.62.6","externalIp":"73.33.205.52","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=219.176.62.6 ::: serverIP=73.33.205.52 ::: userName=bob ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: fructed-vulgarizers-mixology.click messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: fructed-vulgarizers-mixology.click severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-25T10:40:30.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 219.176.62.6 serverIP: 73.33.205.52 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"121.61.152.90","externalIp":"4.51.94.164","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=121.61.152.90 ::: serverIP=4.51.94.164 ::: userName=charlie ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "fructed-vulgarizers-mixology.click", "message": "WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"121.61.152.90\",\"externalIp\":\"4.51.94.164\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"fructed-vulgarizers-mixology.click\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T10:40:30.000Z\"} ::: clientIP=121.61.152.90 ::: serverIP=4.51.94.164 ::: userName=charlie ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "fructed-vulgarizers-mixology.click", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-25T10:40:30.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "121.61.152.90", "serverIP": "4.51.94.164", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"121.61.152.90","externalIp":"4.51.94.164","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=121.61.152.90 ::: serverIP=4.51.94.164 ::: userName=charlie ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=fructed-vulgarizers-mixology.click ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"121.61.152.90","externalIp":"4.51.94.164","categories":["Malware"],"tags":[],"destination":"fructed-vulgarizers-mixology.click","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T10:40:30.000Z"} ::: clientIP=121.61.152.90 ::: serverIP=4.51.94.164 ::: userName=charlie ::: created_at=2023-05-25T10:40:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T10:40:30.000Z ::: serverHostname=fructed-vulgarizers-mixology.click ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: fructed-vulgarizers-mixology.click messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: fructed-vulgarizers-mixology.click severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-25T10:40:30.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 121.61.152.90 serverIP: 4.51.94.164 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"215.195.193.97","externalIp":"151.231.57.97","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=215.195.193.97 ::: serverIP=151.231.57.97 ::: userName=alice ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cambbek.com", "message": "WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"215.195.193.97\",\"externalIp\":\"151.231.57.97\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"cambbek.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T18:07:49.000Z\"} ::: clientIP=215.195.193.97 ::: serverIP=151.231.57.97 ::: userName=alice ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cambbek.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-25T18:07:49.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Phishing", "streamName": "OpenDNS Detection", "clientIP": "215.195.193.97", "serverIP": "151.231.57.97", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"215.195.193.97","externalIp":"151.231.57.97","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=215.195.193.97 ::: serverIP=151.231.57.97 ::: userName=alice ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"215.195.193.97","externalIp":"151.231.57.97","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=215.195.193.97 ::: serverIP=151.231.57.97 ::: userName=alice ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cambbek.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cambbek.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-25T18:07:49.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Phishing streamName: OpenDNS Detection clientIP: 215.195.193.97 serverIP: 151.231.57.97 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"60.202.83.54","externalIp":"70.91.12.83","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=60.202.83.54 ::: serverIP=70.91.12.83 ::: userName=charlie ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "cambbek.com", "message": "WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"60.202.83.54\",\"externalIp\":\"70.91.12.83\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"cambbek.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-25T18:07:49.000Z\"} ::: clientIP=60.202.83.54 ::: serverIP=70.91.12.83 ::: userName=charlie ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "cambbek.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-25T18:07:49.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Phishing", "streamName": "OpenDNS Detection", "clientIP": "60.202.83.54", "serverIP": "70.91.12.83", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"60.202.83.54","externalIp":"70.91.12.83","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=60.202.83.54 ::: serverIP=70.91.12.83 ::: userName=charlie ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=cambbek.com ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"60.202.83.54","externalIp":"70.91.12.83","categories":["Phishing"],"tags":[],"destination":"cambbek.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-25T18:07:49.000Z"} ::: clientIP=60.202.83.54 ::: serverIP=70.91.12.83 ::: userName=charlie ::: created_at=2023-05-25T18:07:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-25T18:07:49.000Z ::: serverHostname=cambbek.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: cambbek.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: cambbek.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-25T18:07:49.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Phishing streamName: OpenDNS Detection clientIP: 60.202.83.54 serverIP: 70.91.12.83 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"acme_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attacmeed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"19.207.130.183","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=19.207.130.183 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=19.207.130.183 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "bsuznvdosnx@gmail.com", "emailsendingserver": "209.85.217.51", "emailsubject": "Account Debit Notification: Your account has been debited", "filehash": "<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>", "filename": "from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatStatus\":\"active\",\"classification\":\"toad\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatTime\":\"2023-08-28T15:46:01.000Z\",\"threat\":\"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"campaignID\":null,\"threatType\":\"messageText\"}],\"messageTime\":\"2023-08-28T15:46:01.000Z\",\"impostorScore\":0,\"malwareScore\":100,\"cluster\":\"acme_hosted\",\"subject\":\"Account Debit Notification: Your account has been debited\",\"quarantineFolder\":\"Malware\",\"quarantineRule\":\"inbound_malware\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":345948,\"headerFrom\":\"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"bsuznvdosnx@gmail.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"mnavarro@sandiegoprivatebank.net\"],\"xmailer\":\"Microsoft CDO for Windows 2000\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278\",\"md5\":\"7705448f293829edc918691974a3b101\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attacmeed\",\"sha256\":\"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c\",\"md5\":\"0293037179e96ace279d9de797c7f4cc\",\"filename\":\"ame491thk.pdf\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/pdf\",\"contentType\":\"application/pdf\"}],\"completelyRewritten\":false,\"id\":\"e85654e8-1a59-0215-27ba-032291cb7703\",\"QID\":\"3sqd8rgqt8-1\",\"GUID\":\"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"sender\":\"bsuznvdosnx@gmail.com\",\"recipient\":[\"mnavarro@sandiegoprivatebank.net\"],\"senderIP\":\"19.207.130.183\",\"messageID\":\"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>\"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=19.207.130.183 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=19.207.130.183 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-08-28T15:46:01.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "19.207.130.183" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"acme_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attacmeed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"19.207.130.183","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=19.207.130.183 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=19.207.130.183 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"acme_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attacmeed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"19.207.130.183","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=19.207.130.183 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=19.207.130.183 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: bsuznvdosnx@gmail.com emailsendingserver: 209.85.217.51 emailsubject: Account Debit Notification: Your account has been debited filehash: <2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> filename: from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-08-28T15:46:01.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 19.207.130.183
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"oscorp_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"131.99.118.137","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=131.99.118.137 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=131.99.118.137 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "bsuznvdosnx@gmail.com", "emailsendingserver": "209.85.217.51", "emailsubject": "Account Debit Notification: Your account has been debited", "filehash": "<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>", "filename": "from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatStatus\":\"active\",\"classification\":\"toad\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatTime\":\"2023-08-28T15:46:01.000Z\",\"threat\":\"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"campaignID\":null,\"threatType\":\"messageText\"}],\"messageTime\":\"2023-08-28T15:46:01.000Z\",\"impostorScore\":0,\"malwareScore\":100,\"cluster\":\"oscorp_hosted\",\"subject\":\"Account Debit Notification: Your account has been debited\",\"quarantineFolder\":\"Malware\",\"quarantineRule\":\"inbound_malware\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":345948,\"headerFrom\":\"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"bsuznvdosnx@gmail.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"mnavarro@sandiegoprivatebank.net\"],\"xmailer\":\"Microsoft CDO for Windows 2000\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278\",\"md5\":\"7705448f293829edc918691974a3b101\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attoscorped\",\"sha256\":\"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c\",\"md5\":\"0293037179e96ace279d9de797c7f4cc\",\"filename\":\"ame491thk.pdf\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/pdf\",\"contentType\":\"application/pdf\"}],\"completelyRewritten\":false,\"id\":\"e85654e8-1a59-0215-27ba-032291cb7703\",\"QID\":\"3sqd8rgqt8-1\",\"GUID\":\"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"sender\":\"bsuznvdosnx@gmail.com\",\"recipient\":[\"mnavarro@sandiegoprivatebank.net\"],\"senderIP\":\"131.99.118.137\",\"messageID\":\"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>\"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=131.99.118.137 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=131.99.118.137 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-08-28T15:46:01.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "131.99.118.137" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"oscorp_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"131.99.118.137","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=131.99.118.137 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=131.99.118.137 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"oscorp_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"131.99.118.137","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=131.99.118.137 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=131.99.118.137 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: bsuznvdosnx@gmail.com emailsendingserver: 209.85.217.51 emailsubject: Account Debit Notification: Your account has been debited filehash: <2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> filename: from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-08-28T15:46:01.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 131.99.118.137
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"acme_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attacmeed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"114.39.41.31","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=114.39.41.31 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=114.39.41.31 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "bsuznvdosnx@gmail.com", "emailsendingserver": "209.85.217.51", "emailsubject": "Account Debit Notification: Your account has been debited", "filehash": "<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>", "filename": "from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatStatus\":\"active\",\"classification\":\"toad\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatTime\":\"2023-08-28T15:46:01.000Z\",\"threat\":\"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"campaignID\":null,\"threatType\":\"messageText\"}],\"messageTime\":\"2023-08-28T15:46:01.000Z\",\"impostorScore\":0,\"malwareScore\":100,\"cluster\":\"acme_hosted\",\"subject\":\"Account Debit Notification: Your account has been debited\",\"quarantineFolder\":\"Malware\",\"quarantineRule\":\"inbound_malware\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":345948,\"headerFrom\":\"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"bsuznvdosnx@gmail.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"mnavarro@sandiegoprivatebank.net\"],\"xmailer\":\"Microsoft CDO for Windows 2000\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278\",\"md5\":\"7705448f293829edc918691974a3b101\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attacmeed\",\"sha256\":\"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c\",\"md5\":\"0293037179e96ace279d9de797c7f4cc\",\"filename\":\"ame491thk.pdf\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/pdf\",\"contentType\":\"application/pdf\"}],\"completelyRewritten\":false,\"id\":\"e85654e8-1a59-0215-27ba-032291cb7703\",\"QID\":\"3sqd8rgqt8-1\",\"GUID\":\"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"sender\":\"bsuznvdosnx@gmail.com\",\"recipient\":[\"mnavarro@sandiegoprivatebank.net\"],\"senderIP\":\"114.39.41.31\",\"messageID\":\"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>\"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=114.39.41.31 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=114.39.41.31 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-08-28T15:46:01.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "114.39.41.31" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"acme_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attacmeed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"114.39.41.31","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=114.39.41.31 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=114.39.41.31 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"acme_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attacmeed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"114.39.41.31","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=114.39.41.31 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=114.39.41.31 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: bsuznvdosnx@gmail.com emailsendingserver: 209.85.217.51 emailsubject: Account Debit Notification: Your account has been debited filehash: <2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> filename: from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-08-28T15:46:01.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 114.39.41.31
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"stark_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"85.67.208.139","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=85.67.208.139 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=85.67.208.139 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "bsuznvdosnx@gmail.com", "emailsendingserver": "209.85.217.51", "emailsubject": "Account Debit Notification: Your account has been debited", "filehash": "<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>", "filename": "from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatStatus\":\"active\",\"classification\":\"toad\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatTime\":\"2023-08-28T15:46:01.000Z\",\"threat\":\"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"campaignID\":null,\"threatType\":\"messageText\"}],\"messageTime\":\"2023-08-28T15:46:01.000Z\",\"impostorScore\":0,\"malwareScore\":100,\"cluster\":\"stark_hosted\",\"subject\":\"Account Debit Notification: Your account has been debited\",\"quarantineFolder\":\"Malware\",\"quarantineRule\":\"inbound_malware\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":345948,\"headerFrom\":\"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"bsuznvdosnx@gmail.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"mnavarro@sandiegoprivatebank.net\"],\"xmailer\":\"Microsoft CDO for Windows 2000\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278\",\"md5\":\"7705448f293829edc918691974a3b101\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attstarked\",\"sha256\":\"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c\",\"md5\":\"0293037179e96ace279d9de797c7f4cc\",\"filename\":\"ame491thk.pdf\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/pdf\",\"contentType\":\"application/pdf\"}],\"completelyRewritten\":false,\"id\":\"e85654e8-1a59-0215-27ba-032291cb7703\",\"QID\":\"3sqd8rgqt8-1\",\"GUID\":\"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"sender\":\"bsuznvdosnx@gmail.com\",\"recipient\":[\"mnavarro@sandiegoprivatebank.net\"],\"senderIP\":\"85.67.208.139\",\"messageID\":\"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>\"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=85.67.208.139 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=85.67.208.139 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-08-28T15:46:01.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "85.67.208.139" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"stark_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"85.67.208.139","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=85.67.208.139 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=85.67.208.139 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"stark_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"85.67.208.139","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=85.67.208.139 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=85.67.208.139 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: bsuznvdosnx@gmail.com emailsendingserver: 209.85.217.51 emailsubject: Account Debit Notification: Your account has been debited filehash: <2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> filename: from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-08-28T15:46:01.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 85.67.208.139
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"wayne_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"134.27.117.67","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=134.27.117.67 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=134.27.117.67 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "bsuznvdosnx@gmail.com", "emailsendingserver": "209.85.217.51", "emailsubject": "Account Debit Notification: Your account has been debited", "filehash": "<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>", "filename": "from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatStatus\":\"active\",\"classification\":\"toad\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatTime\":\"2023-08-28T15:46:01.000Z\",\"threat\":\"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"campaignID\":null,\"threatType\":\"messageText\"}],\"messageTime\":\"2023-08-28T15:46:01.000Z\",\"impostorScore\":0,\"malwareScore\":100,\"cluster\":\"wayne_hosted\",\"subject\":\"Account Debit Notification: Your account has been debited\",\"quarantineFolder\":\"Malware\",\"quarantineRule\":\"inbound_malware\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":345948,\"headerFrom\":\"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"bsuznvdosnx@gmail.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"mnavarro@sandiegoprivatebank.net\"],\"xmailer\":\"Microsoft CDO for Windows 2000\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278\",\"md5\":\"7705448f293829edc918691974a3b101\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attwayneed\",\"sha256\":\"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c\",\"md5\":\"0293037179e96ace279d9de797c7f4cc\",\"filename\":\"ame491thk.pdf\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/pdf\",\"contentType\":\"application/pdf\"}],\"completelyRewritten\":false,\"id\":\"e85654e8-1a59-0215-27ba-032291cb7703\",\"QID\":\"3sqd8rgqt8-1\",\"GUID\":\"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"sender\":\"bsuznvdosnx@gmail.com\",\"recipient\":[\"mnavarro@sandiegoprivatebank.net\"],\"senderIP\":\"134.27.117.67\",\"messageID\":\"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>\"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=134.27.117.67 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=134.27.117.67 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-08-28T15:46:01.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "134.27.117.67" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"wayne_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"134.27.117.67","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=134.27.117.67 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=134.27.117.67 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"wayne_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"134.27.117.67","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=134.27.117.67 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=134.27.117.67 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: bsuznvdosnx@gmail.com emailsendingserver: 209.85.217.51 emailsubject: Account Debit Notification: Your account has been debited filehash: <2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> filename: from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-08-28T15:46:01.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 134.27.117.67
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"umbrella_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attumbrellaed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"141.132.24.167","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=141.132.24.167 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=141.132.24.167 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "bsuznvdosnx@gmail.com", "emailsendingserver": "209.85.217.51", "emailsubject": "Account Debit Notification: Your account has been debited", "filehash": "<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>", "filename": "from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatStatus\":\"active\",\"classification\":\"toad\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatTime\":\"2023-08-28T15:46:01.000Z\",\"threat\":\"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"campaignID\":null,\"threatType\":\"messageText\"}],\"messageTime\":\"2023-08-28T15:46:01.000Z\",\"impostorScore\":0,\"malwareScore\":100,\"cluster\":\"umbrella_hosted\",\"subject\":\"Account Debit Notification: Your account has been debited\",\"quarantineFolder\":\"Malware\",\"quarantineRule\":\"inbound_malware\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":345948,\"headerFrom\":\"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"bsuznvdosnx@gmail.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"mnavarro@sandiegoprivatebank.net\"],\"xmailer\":\"Microsoft CDO for Windows 2000\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278\",\"md5\":\"7705448f293829edc918691974a3b101\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c\",\"md5\":\"0293037179e96ace279d9de797c7f4cc\",\"filename\":\"ame491thk.pdf\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/pdf\",\"contentType\":\"application/pdf\"}],\"completelyRewritten\":false,\"id\":\"e85654e8-1a59-0215-27ba-032291cb7703\",\"QID\":\"3sqd8rgqt8-1\",\"GUID\":\"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"sender\":\"bsuznvdosnx@gmail.com\",\"recipient\":[\"mnavarro@sandiegoprivatebank.net\"],\"senderIP\":\"141.132.24.167\",\"messageID\":\"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>\"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=141.132.24.167 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=141.132.24.167 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-08-28T15:46:01.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "141.132.24.167" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"umbrella_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attumbrellaed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"141.132.24.167","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=141.132.24.167 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=141.132.24.167 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"umbrella_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attumbrellaed","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"141.132.24.167","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=141.132.24.167 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=141.132.24.167 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: bsuznvdosnx@gmail.com emailsendingserver: 209.85.217.51 emailsubject: Account Debit Notification: Your account has been debited filehash: <2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> filename: from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-08-28T15:46:01.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 141.132.24.167
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"oscorp_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"32.189.47.63","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=32.189.47.63 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=32.189.47.63 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "bsuznvdosnx@gmail.com", "emailsendingserver": "209.85.217.51", "emailsubject": "Account Debit Notification: Your account has been debited", "filehash": "<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>", "filename": "from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatStatus\":\"active\",\"classification\":\"toad\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatTime\":\"2023-08-28T15:46:01.000Z\",\"threat\":\"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"campaignID\":null,\"threatType\":\"messageText\"}],\"messageTime\":\"2023-08-28T15:46:01.000Z\",\"impostorScore\":0,\"malwareScore\":100,\"cluster\":\"oscorp_hosted\",\"subject\":\"Account Debit Notification: Your account has been debited\",\"quarantineFolder\":\"Malware\",\"quarantineRule\":\"inbound_malware\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":345948,\"headerFrom\":\"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"bsuznvdosnx@gmail.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"mnavarro@sandiegoprivatebank.net\"],\"xmailer\":\"Microsoft CDO for Windows 2000\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278\",\"md5\":\"7705448f293829edc918691974a3b101\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attoscorped\",\"sha256\":\"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c\",\"md5\":\"0293037179e96ace279d9de797c7f4cc\",\"filename\":\"ame491thk.pdf\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/pdf\",\"contentType\":\"application/pdf\"}],\"completelyRewritten\":false,\"id\":\"e85654e8-1a59-0215-27ba-032291cb7703\",\"QID\":\"3sqd8rgqt8-1\",\"GUID\":\"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"sender\":\"bsuznvdosnx@gmail.com\",\"recipient\":[\"mnavarro@sandiegoprivatebank.net\"],\"senderIP\":\"32.189.47.63\",\"messageID\":\"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>\"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=32.189.47.63 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=32.189.47.63 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-08-28T15:46:01.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "32.189.47.63" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"oscorp_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"32.189.47.63","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=32.189.47.63 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=32.189.47.63 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"oscorp_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"32.189.47.63","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=32.189.47.63 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=32.189.47.63 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: bsuznvdosnx@gmail.com emailsendingserver: 209.85.217.51 emailsubject: Account Debit Notification: Your account has been debited filehash: <2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> filename: from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-08-28T15:46:01.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 32.189.47.63
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"stark_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"152.175.184.83","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=152.175.184.83 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=152.175.184.83 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "bsuznvdosnx@gmail.com", "emailsendingserver": "209.85.217.51", "emailsubject": "Account Debit Notification: Your account has been debited", "filehash": "<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>", "filename": "from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatStatus\":\"active\",\"classification\":\"toad\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4\",\"threatTime\":\"2023-08-28T15:46:01.000Z\",\"threat\":\"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"campaignID\":null,\"threatType\":\"messageText\"}],\"messageTime\":\"2023-08-28T15:46:01.000Z\",\"impostorScore\":0,\"malwareScore\":100,\"cluster\":\"stark_hosted\",\"subject\":\"Account Debit Notification: Your account has been debited\",\"quarantineFolder\":\"Malware\",\"quarantineRule\":\"inbound_malware\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":345948,\"headerFrom\":\"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"bsuznvdosnx@gmail.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"mnavarro@sandiegoprivatebank.net\"],\"xmailer\":\"Microsoft CDO for Windows 2000\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"inline\",\"sha256\":\"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278\",\"md5\":\"7705448f293829edc918691974a3b101\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attstarked\",\"sha256\":\"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c\",\"md5\":\"0293037179e96ace279d9de797c7f4cc\",\"filename\":\"ame491thk.pdf\",\"sandboxStatus\":\"CLEAN\",\"oContentType\":\"application/pdf\",\"contentType\":\"application/pdf\"}],\"completelyRewritten\":false,\"id\":\"e85654e8-1a59-0215-27ba-032291cb7703\",\"QID\":\"3sqd8rgqt8-1\",\"GUID\":\"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L\",\"sender\":\"bsuznvdosnx@gmail.com\",\"recipient\":[\"mnavarro@sandiegoprivatebank.net\"],\"senderIP\":\"152.175.184.83\",\"messageID\":\"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>\"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=152.175.184.83 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=152.175.184.83 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-08-28T15:46:01.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "152.175.184.83" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"stark_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"152.175.184.83","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=152.175.184.83 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=152.175.184.83 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatStatus":"active","classification":"toad","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/223ad08fb3adc01fede7cf6ac830573e125181bf7e26f9e0bb4fb16984f5edd4","threatTime":"2023-08-28T15:46:01.000Z","threat":"bsuznvdosnx@gmail.com:f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","campaignID":null,"threatType":"messageText"}],"messageTime":"2023-08-28T15:46:01.000Z","impostorScore":0,"malwareScore":100,"cluster":"stark_hosted","subject":"Account Debit Notification: Your account has been debited","quarantineFolder":"Malware","quarantineRule":"inbound_malware","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":345948,"headerFrom":"=?utf-8?Q?Mark Rowland?= <bsuznvdosnx@gmail.com>","headerReplyTo":null,"fromAddress":["bsuznvdosnx@gmail.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["mnavarro@sandiegoprivatebank.net"],"xmailer":"Microsoft CDO for Windows 2000","messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"CLEAN","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"inline","sha256":"5c823c4958991aeb5e592a9530001b0f2a364acf08ba71e5efd5a613b22df278","md5":"7705448f293829edc918691974a3b101","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"7e38c1a041c4f3c2fe300673907831a37768fef2488907fbb1127990f2fdf13c","md5":"0293037179e96ace279d9de797c7f4cc","filename":"ame491thk.pdf","sandboxStatus":"CLEAN","oContentType":"application/pdf","contentType":"application/pdf"}],"completelyRewritten":false,"id":"e85654e8-1a59-0215-27ba-032291cb7703","QID":"3sqd8rgqt8-1","GUID":"f9LZwPwatJ_0-7dd5VmocxSZEWSqjQ-L","sender":"bsuznvdosnx@gmail.com","recipient":["mnavarro@sandiegoprivatebank.net"],"senderIP":"152.175.184.83","messageID":"<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1>"} ::: fileHash=<2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> ::: fileName=from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited ::: serverIP=152.175.184.83 ::: emailFrom=bsuznvdosnx@gmail.com ::: created_at=2023-08-28T15:46:01.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Account Debit Notification: Your account has been debited ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-28T15:46:01.000Z ::: emailSendingServer=152.175.184.83 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: bsuznvdosnx@gmail.com emailsendingserver: 209.85.217.51 emailsubject: Account Debit Notification: Your account has been debited filehash: <2BD77403DDAF4E7FB58C53B5149E0ED9@instance1> filename: from: bsuznvdosnx@gmail.com subj: Account Debit Notification: Your account has been debited messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-08-28T15:46:01.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 152.175.184.83
Explain this syslog message
<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=224.40.131.47 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=133.191.36.120 spt=33354 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=133.191.36.120 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 33354, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1694087617269 ", "message": "<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=224.40.131.47 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=133.191.36.120 spt=33354 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication=\"Hello World\" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=133.191.36.120 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:185.224.128.142", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "133.191.36.120", "serverIP": "224.40.131.47", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=224.40.131.47 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=133.191.36.120 spt=33354 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=133.191.36.120 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=224.40.131.47 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=133.191.36.120 spt=33354 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=133.191.36.120 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 33354 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1694087617269 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.224.128.142', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 133.191.36.120 serverIP: 224.40.131.47 userName: -
Explain this syslog message
<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=222.241.24.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=99.124.109.224 spt=33354 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=99.124.109.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 33354, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1694087617269 ", "message": "<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=222.241.24.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=99.124.109.224 spt=33354 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication=\"Hello World\" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=99.124.109.224 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:185.224.128.142", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "99.124.109.224", "serverIP": "222.241.24.66", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=222.241.24.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=99.124.109.224 spt=33354 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=99.124.109.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=222.241.24.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=99.124.109.224 spt=33354 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=99.124.109.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 33354 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1694087617269 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.224.128.142', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 99.124.109.224 serverIP: 222.241.24.66 userName: -
Explain this syslog message
<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=19.2.63.69 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=197.96.36.116 spt=33354 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=197.96.36.116 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 33354, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1694087617269 ", "message": "<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=19.2.63.69 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=197.96.36.116 spt=33354 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication=\"Hello World\" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=197.96.36.116 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:185.224.128.142", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "197.96.36.116", "serverIP": "19.2.63.69", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=19.2.63.69 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=197.96.36.116 spt=33354 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=197.96.36.116 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 7 06:53:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=19.2.63.69 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=197.96.36.116 spt=33354 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 06:53:37 rt=1694087617269 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=18a6f7d9af5-4a96048b cn2=33354 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=197.96.36.116 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 33354 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1694087617269 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.224.128.142', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 197.96.36.116 serverIP: 19.2.63.69 userName: -
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t158.128.178.171\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"158.128.178.171","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}}
{ "action": "Logon", "clientport": 64053, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-08-25T15:03:44.870Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-08-25T15:03:46.231Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t158.128.178.171\\n\\tSource Port:\\t\\t64053\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"158.128.178.171\",\"IpPort\":\"64053\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":2060}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6252454048,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6252454048", "streamName": "microsoft-windows-security-auditing", "clientIP": "158.128.178.171", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t158.128.178.171\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"158.128.178.171","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t158.128.178.171\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"158.128.178.171","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 64053 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6252454048 streamName: microsoft-windows-security-auditing clientIP: 158.128.178.171 userName: janedoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t248.93.72.53\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"248.93.72.53","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}}
{ "action": "Logon", "clientport": 64053, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-08-25T15:03:44.870Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-08-25T15:03:46.231Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t248.93.72.53\\n\\tSource Port:\\t\\t64053\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"248.93.72.53\",\"IpPort\":\"64053\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":2060}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6252454048,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6252454048", "streamName": "microsoft-windows-security-auditing", "clientIP": "248.93.72.53", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t248.93.72.53\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"248.93.72.53","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t248.93.72.53\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"248.93.72.53","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 64053 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6252454048 streamName: microsoft-windows-security-auditing clientIP: 248.93.72.53 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t15.87.21.16\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"15.87.21.16","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}}
{ "action": "Logon", "clientport": 64053, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-08-25T15:03:44.870Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-08-25T15:03:46.231Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t15.87.21.16\\n\\tSource Port:\\t\\t64053\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"15.87.21.16\",\"IpPort\":\"64053\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":2060}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6252454048,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6252454048", "streamName": "microsoft-windows-security-auditing", "clientIP": "15.87.21.16", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t15.87.21.16\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"15.87.21.16","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t15.87.21.16\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"15.87.21.16","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 64053 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6252454048 streamName: microsoft-windows-security-auditing clientIP: 15.87.21.16 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t226.63.145.233\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"226.63.145.233","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}}
{ "action": "Logon", "clientport": 64053, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-08-25T15:03:44.870Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-08-25T15:03:46.231Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t226.63.145.233\\n\\tSource Port:\\t\\t64053\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"226.63.145.233\",\"IpPort\":\"64053\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":2060}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6252454048,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6252454048", "streamName": "microsoft-windows-security-auditing", "clientIP": "226.63.145.233", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t226.63.145.233\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"226.63.145.233","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-25T15:03:44.870Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-25T15:03:46.231Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t226.63.145.233\n\tSource Port:\t\t64053\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"226.63.145.233","IpPort":"64053","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6252454048,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 64053 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6252454048 streamName: microsoft-windows-security-auditing clientIP: 226.63.145.233 userName: janedoe
Explain this syslog message
<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=196.153.198.26 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=83.243.0.132 spt=47390 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.243.0.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:87.250.224.53", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=196.153.198.26 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=83.243.0.132 spt=47390 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)\" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.243.0.132 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1676479504722 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/robots.txt", "clientport": 47390, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "83.243.0.132", "serverIP": "196.153.198.26", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=196.153.198.26 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=83.243.0.132 spt=47390 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.243.0.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=196.153.198.26 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=83.243.0.132 spt=47390 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.243.0.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:87.250.224.53', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1676479504722 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /robots.txt clientport: 47390 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 83.243.0.132 serverIP: 196.153.198.26 userName: -
Explain this syslog message
<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=91.65.134.53 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=55.217.200.116 spt=47390 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.217.200.116 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:87.250.224.53", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=91.65.134.53 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=55.217.200.116 spt=47390 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)\" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.217.200.116 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1676479504722 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/robots.txt", "clientport": 47390, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "55.217.200.116", "serverIP": "91.65.134.53", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=91.65.134.53 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=55.217.200.116 spt=47390 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.217.200.116 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=91.65.134.53 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=55.217.200.116 spt=47390 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.217.200.116 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:87.250.224.53', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1676479504722 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /robots.txt clientport: 47390 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 55.217.200.116 serverIP: 91.65.134.53 userName: -
Explain this syslog message
<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=150.152.161.192 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=71.42.185.16 spt=47390 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.42.185.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:87.250.224.53", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=150.152.161.192 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=71.42.185.16 spt=47390 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)\" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.42.185.16 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1676479504722 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/robots.txt", "clientport": 47390, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "71.42.185.16", "serverIP": "150.152.161.192", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=150.152.161.192 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=71.42.185.16 spt=47390 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.42.185.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 15 10:45:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=150.152.161.192 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=71.42.185.16 spt=47390 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:04 rt=1676479504722 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f72152-e79a97ca cn2=47390 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.42.185.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:87.250.224.53', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1676479504722 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /robots.txt clientport: 47390 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 71.42.185.16 serverIP: 150.152.161.192 userName: -
Explain this syslog message
<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=86.156.180.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=170.92.165.139 spt=48922 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.92.165.139 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:87.250.224.53", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=86.156.180.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=170.92.165.139 spt=48922 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication=\"Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)\" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.92.165.139 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1676479508529 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/Volunteer/VolOpInfo.jsp", "clientport": 48922, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "170.92.165.139", "serverIP": "86.156.180.16", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=86.156.180.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=170.92.165.139 spt=48922 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.92.165.139 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=86.156.180.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=170.92.165.139 spt=48922 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.92.165.139 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:87.250.224.53', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1676479508529 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /Volunteer/VolOpInfo.jsp clientport: 48922 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 170.92.165.139 serverIP: 86.156.180.16 userName: -
Explain this syslog message
<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.162.217.176 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=98.39.85.4 spt=48922 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=98.39.85.4 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:87.250.224.53", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.162.217.176 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=98.39.85.4 spt=48922 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication=\"Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)\" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=98.39.85.4 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1676479508529 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/Volunteer/VolOpInfo.jsp", "clientport": 48922, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "98.39.85.4", "serverIP": "224.162.217.176", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.162.217.176 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=98.39.85.4 spt=48922 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=98.39.85.4 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.162.217.176 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=98.39.85.4 spt=48922 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=98.39.85.4 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:87.250.224.53', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1676479508529 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /Volunteer/VolOpInfo.jsp clientport: 48922 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 98.39.85.4 serverIP: 224.162.217.176 userName: -
Explain this syslog message
<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=214.228.121.0 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.42.253.25 spt=48922 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.42.253.25 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:87.250.224.53", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=214.228.121.0 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=131.42.253.25 spt=48922 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication=\"Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)\" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.42.253.25 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1676479508529 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/Volunteer/VolOpInfo.jsp", "clientport": 48922, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "131.42.253.25", "serverIP": "214.228.121.0", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=214.228.121.0 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.42.253.25 spt=48922 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.42.253.25 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 15 10:45:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=214.228.121.0 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.42.253.25 spt=48922 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 15 2023 10:45:08 rt=1676479508529 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18655f73031-e3cd7126 cn2=48922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.42.253.25 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:87.250.224.53', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1676479508529 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /Volunteer/VolOpInfo.jsp clientport: 48922 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 131.42.253.25 serverIP: 214.228.121.0 userName: -
Explain this syslog message
<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=46.239.45.101 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=0.96.41.111 spt=53258 requestMethod=GET app=HTTP requestContext="-" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.96.41.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53258, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1692632498285 ", "message": "<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=46.239.45.101 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=0.96.41.111 spt=53258 requestMethod=GET app=HTTP requestContext=\"-\" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.96.41.111 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:83.97.73.87", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "0.96.41.111", "serverIP": "46.239.45.101", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=46.239.45.101 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=0.96.41.111 spt=53258 requestMethod=GET app=HTTP requestContext="-" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.96.41.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=46.239.45.101 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=0.96.41.111 spt=53258 requestMethod=GET app=HTTP requestContext="-" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.96.41.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53258 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1692632498285 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:83.97.73.87', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 0.96.41.111 serverIP: 46.239.45.101 userName: -
Explain this syslog message
<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=205.141.233.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=28.68.99.163 spt=53258 requestMethod=GET app=HTTP requestContext="-" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.68.99.163 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53258, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1692632498285 ", "message": "<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=205.141.233.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=28.68.99.163 spt=53258 requestMethod=GET app=HTTP requestContext=\"-\" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.68.99.163 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:83.97.73.87", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "28.68.99.163", "serverIP": "205.141.233.128", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=205.141.233.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=28.68.99.163 spt=53258 requestMethod=GET app=HTTP requestContext="-" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.68.99.163 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=205.141.233.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=28.68.99.163 spt=53258 requestMethod=GET app=HTTP requestContext="-" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.68.99.163 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53258 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1692632498285 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:83.97.73.87', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 28.68.99.163 serverIP: 205.141.233.128 userName: -
Explain this syslog message
<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=126.212.142.73 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=253.59.253.157 spt=53258 requestMethod=GET app=HTTP requestContext="-" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.59.253.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53258, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1692632498285 ", "message": "<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=126.212.142.73 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=253.59.253.157 spt=53258 requestMethod=GET app=HTTP requestContext=\"-\" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.59.253.157 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:83.97.73.87", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "253.59.253.157", "serverIP": "126.212.142.73", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=126.212.142.73 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=253.59.253.157 spt=53258 requestMethod=GET app=HTTP requestContext="-" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.59.253.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 21 10:41:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=126.212.142.73 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=253.59.253.157 spt=53258 requestMethod=GET app=HTTP requestContext="-" start=Aug 21 2023 10:41:38 rt=1692632498285 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a18c2405c-7faa95a6 cn2=53258 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.59.253.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53258 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1692632498285 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:83.97.73.87', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 253.59.253.157 serverIP: 126.212.142.73 userName: -
Explain this syslog message
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=39.252.117.128 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=53.41.216.231 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=53.41.216.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 36108, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/*", "localhostname": "WAFirewall", "localstarttime": "1703509558882 ", "message": "<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=39.252.117.128 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=53.41.216.231 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=53.41.216.231 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "MALFORMED_VERSION", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_MALFORMED_VERSION", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION", "SessionID:-", "ProxyIP:162.142.125.217" ], "vendorcode": "119", "streamName": "barracuda_waf", "clientIP": "53.41.216.231", "serverIP": "39.252.117.128", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=39.252.117.128 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=53.41.216.231 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=53.41.216.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=39.252.117.128 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=53.41.216.231 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=53.41.216.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 36108 facilitycode: 23 facilitylabel: local7 fqdn: /* localhostname: WAFirewall localstarttime: 1703509558882 messagetype: MALFORMED_VERSION priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'SessionID:-', 'ProxyIP:162.142.125.217'] vendorcode: 119 streamName: barracuda_waf clientIP: 53.41.216.231 serverIP: 39.252.117.128 userName: -
Explain this syslog message
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=215.93.254.40 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=91.103.206.200 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=91.103.206.200 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 36108, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/*", "localhostname": "WAFirewall", "localstarttime": "1703509558882 ", "message": "<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=215.93.254.40 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=91.103.206.200 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=91.103.206.200 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "MALFORMED_VERSION", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_MALFORMED_VERSION", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION", "SessionID:-", "ProxyIP:162.142.125.217" ], "vendorcode": "119", "streamName": "barracuda_waf", "clientIP": "91.103.206.200", "serverIP": "215.93.254.40", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=215.93.254.40 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=91.103.206.200 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=91.103.206.200 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=215.93.254.40 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=91.103.206.200 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=91.103.206.200 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 36108 facilitycode: 23 facilitylabel: local7 fqdn: /* localhostname: WAFirewall localstarttime: 1703509558882 messagetype: MALFORMED_VERSION priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'SessionID:-', 'ProxyIP:162.142.125.217'] vendorcode: 119 streamName: barracuda_waf clientIP: 91.103.206.200 serverIP: 215.93.254.40 userName: -
Explain this syslog message
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=112.144.247.157 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=137.191.91.156 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=137.191.91.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 36108, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/*", "localhostname": "WAFirewall", "localstarttime": "1703509558882 ", "message": "<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=112.144.247.157 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=137.191.91.156 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=137.191.91.156 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "MALFORMED_VERSION", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_MALFORMED_VERSION", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION", "SessionID:-", "ProxyIP:162.142.125.217" ], "vendorcode": "119", "streamName": "barracuda_waf", "clientIP": "137.191.91.156", "serverIP": "112.144.247.157", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=112.144.247.157 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=137.191.91.156 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=137.191.91.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=112.144.247.157 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=137.191.91.156 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=137.191.91.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 36108 facilitycode: 23 facilitylabel: local7 fqdn: /* localhostname: WAFirewall localstarttime: 1703509558882 messagetype: MALFORMED_VERSION priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'SessionID:-', 'ProxyIP:162.142.125.217'] vendorcode: 119 streamName: barracuda_waf clientIP: 137.191.91.156 serverIP: 112.144.247.157 userName: -
Explain this syslog message
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=60.63.92.173 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=21.6.188.35 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=21.6.188.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 36108, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/*", "localhostname": "WAFirewall", "localstarttime": "1703509558882 ", "message": "<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=60.63.92.173 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=21.6.188.35 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=21.6.188.35 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "MALFORMED_VERSION", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_MALFORMED_VERSION", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION", "SessionID:-", "ProxyIP:162.142.125.217" ], "vendorcode": "119", "streamName": "barracuda_waf", "clientIP": "21.6.188.35", "serverIP": "60.63.92.173", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 25 07:05:58 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=60.63.92.173 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=21.6.188.35 spt=36108 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Dec 25 2023 07:05:58 rt=1703509558882 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ca1150662-ca2edcab cn2=36108 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=21.6.188.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message