input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"19.44.188.182","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=19.44.188.182 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=19.44.188.182 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"19.44.188.182","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=19.44.188.182 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=19.44.188.182 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: jacquelinea@ccdfi.com
emailsendingserver: 40.107.237.126
emailsubject: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi
filehash: <DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>
filename: from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-26T16:14:39.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 19.44.188.182 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"197.190.96.16","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=197.190.96.16 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=197.190.96.16 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "jacquelinea@ccdfi.com",
"emailsendingserver": "40.107.237.126",
"emailsubject": "FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi",
"filehash": "<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>",
"filename": "from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatTime\":\"2023-10-26T16:13:32.000Z\",\"threat\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2023-10-26T16:14:39.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":190373,\"headerFrom\":\"Jacqueline Aguilar <jacquelinea@ccdfi.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"jacquelinea@ccdfi.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attoscorped\",\"sha256\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"md5\":\"44d0ab7332f1a029935bce372fb3c5d5\",\"filename\":\"employee jacquelinea d1067554-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61\",\"md5\":\"966b2674e9ff61c72ea242856ff4995c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9\",\"md5\":\"3484bb76ac447d3141c427edcd948261\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3\",\"md5\":\"8ceac3d79daf846749f6438b1fead7af\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"}],\"completelyRewritten\":false,\"id\":\"3f7bb408-8c1e-f280-ebe6-534d37fb93dc\",\"QID\":\"3tvagqj54f-1\",\"GUID\":\"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8\",\"sender\":\"jacquelinea@ccdfi.com\",\"recipient\":[\"pdixon@oscorp.bank\"],\"senderIP\":\"197.190.96.16\",\"messageID\":\"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>\"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=197.190.96.16 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=197.190.96.16 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-26T16:14:39.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "197.190.96.16"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"197.190.96.16","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=197.190.96.16 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=197.190.96.16 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"197.190.96.16","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=197.190.96.16 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=197.190.96.16 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: jacquelinea@ccdfi.com
emailsendingserver: 40.107.237.126
emailsubject: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi
filehash: <DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>
filename: from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-26T16:14:39.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 197.190.96.16 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"97.254.136.226","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=97.254.136.226 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=97.254.136.226 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "jacquelinea@ccdfi.com",
"emailsendingserver": "40.107.237.126",
"emailsubject": "FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi",
"filehash": "<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>",
"filename": "from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatTime\":\"2023-10-26T16:13:32.000Z\",\"threat\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2023-10-26T16:14:39.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":190373,\"headerFrom\":\"Jacqueline Aguilar <jacquelinea@ccdfi.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"jacquelinea@ccdfi.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attoscorped\",\"sha256\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"md5\":\"44d0ab7332f1a029935bce372fb3c5d5\",\"filename\":\"employee jacquelinea d1067554-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61\",\"md5\":\"966b2674e9ff61c72ea242856ff4995c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9\",\"md5\":\"3484bb76ac447d3141c427edcd948261\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3\",\"md5\":\"8ceac3d79daf846749f6438b1fead7af\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"}],\"completelyRewritten\":false,\"id\":\"3f7bb408-8c1e-f280-ebe6-534d37fb93dc\",\"QID\":\"3tvagqj54f-1\",\"GUID\":\"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8\",\"sender\":\"jacquelinea@ccdfi.com\",\"recipient\":[\"pdixon@oscorp.bank\"],\"senderIP\":\"97.254.136.226\",\"messageID\":\"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>\"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=97.254.136.226 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=97.254.136.226 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-26T16:14:39.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "97.254.136.226"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"97.254.136.226","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=97.254.136.226 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=97.254.136.226 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"97.254.136.226","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=97.254.136.226 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=97.254.136.226 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: jacquelinea@ccdfi.com
emailsendingserver: 40.107.237.126
emailsubject: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi
filehash: <DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>
filename: from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-26T16:14:39.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 97.254.136.226 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attacmement"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542acme4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@acme.bank"],"senderIP":"183.140.118.146","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=183.140.118.146 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=183.140.118.146 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "jacquelinea@ccdfi.com",
"emailsendingserver": "40.107.237.126",
"emailsubject": "FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi",
"filehash": "<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>",
"filename": "from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatTime\":\"2023-10-26T16:13:32.000Z\",\"threat\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"campaignID\":null,\"threatType\":\"attacmement\"}],\"messageTime\":\"2023-10-26T16:14:39.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attacmement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":190373,\"headerFrom\":\"Jacqueline Aguilar <jacquelinea@ccdfi.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"jacquelinea@ccdfi.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attacmeed\",\"sha256\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"md5\":\"44d0ab7332f1a029935bce372fb3c5d5\",\"filename\":\"employee jacquelinea d1067554-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61\",\"md5\":\"966b2674e9ff61c72ea242856ff4995c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"0e7da0b480ee472dd3e542acme4c6080a0841b17b1f0d593e13fb8132729565c9\",\"md5\":\"3484bb76ac447d3141c427edcd948261\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attacmeed\",\"sha256\":\"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3\",\"md5\":\"8ceac3d79daf846749f6438b1fead7af\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"}],\"completelyRewritten\":false,\"id\":\"3f7bb408-8c1e-f280-ebe6-534d37fb93dc\",\"QID\":\"3tvagqj54f-1\",\"GUID\":\"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8\",\"sender\":\"jacquelinea@ccdfi.com\",\"recipient\":[\"pdixon@acme.bank\"],\"senderIP\":\"183.140.118.146\",\"messageID\":\"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>\"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=183.140.118.146 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=183.140.118.146 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-26T16:14:39.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "183.140.118.146"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attacmement"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542acme4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@acme.bank"],"senderIP":"183.140.118.146","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=183.140.118.146 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=183.140.118.146 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attacmement"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542acme4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@acme.bank"],"senderIP":"183.140.118.146","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=183.140.118.146 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=183.140.118.146 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: jacquelinea@ccdfi.com
emailsendingserver: 40.107.237.126
emailsubject: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi
filehash: <DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>
filename: from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-26T16:14:39.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 183.140.118.146 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"166.139.55.163","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=166.139.55.163 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=166.139.55.163 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "jacquelinea@ccdfi.com",
"emailsendingserver": "40.107.237.126",
"emailsubject": "FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi",
"filehash": "<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>",
"filename": "from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatTime\":\"2023-10-26T16:13:32.000Z\",\"threat\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2023-10-26T16:14:39.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":190373,\"headerFrom\":\"Jacqueline Aguilar <jacquelinea@ccdfi.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"jacquelinea@ccdfi.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attoscorped\",\"sha256\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"md5\":\"44d0ab7332f1a029935bce372fb3c5d5\",\"filename\":\"employee jacquelinea d1067554-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61\",\"md5\":\"966b2674e9ff61c72ea242856ff4995c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9\",\"md5\":\"3484bb76ac447d3141c427edcd948261\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3\",\"md5\":\"8ceac3d79daf846749f6438b1fead7af\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"}],\"completelyRewritten\":false,\"id\":\"3f7bb408-8c1e-f280-ebe6-534d37fb93dc\",\"QID\":\"3tvagqj54f-1\",\"GUID\":\"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8\",\"sender\":\"jacquelinea@ccdfi.com\",\"recipient\":[\"pdixon@oscorp.bank\"],\"senderIP\":\"166.139.55.163\",\"messageID\":\"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>\"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=166.139.55.163 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=166.139.55.163 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-26T16:14:39.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "166.139.55.163"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"166.139.55.163","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=166.139.55.163 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=166.139.55.163 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"166.139.55.163","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=166.139.55.163 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=166.139.55.163 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: jacquelinea@ccdfi.com
emailsendingserver: 40.107.237.126
emailsubject: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi
filehash: <DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>
filename: from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-26T16:14:39.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 166.139.55.163 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542wayne4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"182.62.48.216","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=182.62.48.216 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=182.62.48.216 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "jacquelinea@ccdfi.com",
"emailsendingserver": "40.107.237.126",
"emailsubject": "FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi",
"filehash": "<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>",
"filename": "from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatTime\":\"2023-10-26T16:13:32.000Z\",\"threat\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2023-10-26T16:14:39.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":190373,\"headerFrom\":\"Jacqueline Aguilar <jacquelinea@ccdfi.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"jacquelinea@ccdfi.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attwayneed\",\"sha256\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"md5\":\"44d0ab7332f1a029935bce372fb3c5d5\",\"filename\":\"employee jacquelinea d1067554-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61\",\"md5\":\"966b2674e9ff61c72ea242856ff4995c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"0e7da0b480ee472dd3e542wayne4c6080a0841b17b1f0d593e13fb8132729565c9\",\"md5\":\"3484bb76ac447d3141c427edcd948261\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attwayneed\",\"sha256\":\"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3\",\"md5\":\"8ceac3d79daf846749f6438b1fead7af\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"}],\"completelyRewritten\":false,\"id\":\"3f7bb408-8c1e-f280-ebe6-534d37fb93dc\",\"QID\":\"3tvagqj54f-1\",\"GUID\":\"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8\",\"sender\":\"jacquelinea@ccdfi.com\",\"recipient\":[\"pdixon@wayne.bank\"],\"senderIP\":\"182.62.48.216\",\"messageID\":\"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>\"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=182.62.48.216 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=182.62.48.216 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-26T16:14:39.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "182.62.48.216"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542wayne4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"182.62.48.216","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=182.62.48.216 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=182.62.48.216 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542wayne4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"182.62.48.216","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=182.62.48.216 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=182.62.48.216 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: jacquelinea@ccdfi.com
emailsendingserver: 40.107.237.126
emailsubject: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi
filehash: <DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>
filename: from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-26T16:14:39.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 182.62.48.216 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542umbrella4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@umbrella.bank"],"senderIP":"70.116.162.10","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=70.116.162.10 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=70.116.162.10 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "jacquelinea@ccdfi.com",
"emailsendingserver": "40.107.237.126",
"emailsubject": "FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi",
"filehash": "<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>",
"filename": "from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatTime\":\"2023-10-26T16:13:32.000Z\",\"threat\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"campaignID\":null,\"threatType\":\"attumbrellament\"}],\"messageTime\":\"2023-10-26T16:14:39.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attumbrellament Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":190373,\"headerFrom\":\"Jacqueline Aguilar <jacquelinea@ccdfi.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"jacquelinea@ccdfi.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attumbrellaed\",\"sha256\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"md5\":\"44d0ab7332f1a029935bce372fb3c5d5\",\"filename\":\"employee jacquelinea d1067554-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61\",\"md5\":\"966b2674e9ff61c72ea242856ff4995c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"0e7da0b480ee472dd3e542umbrella4c6080a0841b17b1f0d593e13fb8132729565c9\",\"md5\":\"3484bb76ac447d3141c427edcd948261\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3\",\"md5\":\"8ceac3d79daf846749f6438b1fead7af\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"}],\"completelyRewritten\":false,\"id\":\"3f7bb408-8c1e-f280-ebe6-534d37fb93dc\",\"QID\":\"3tvagqj54f-1\",\"GUID\":\"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8\",\"sender\":\"jacquelinea@ccdfi.com\",\"recipient\":[\"pdixon@umbrella.bank\"],\"senderIP\":\"70.116.162.10\",\"messageID\":\"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>\"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=70.116.162.10 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=70.116.162.10 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-26T16:14:39.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "70.116.162.10"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542umbrella4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@umbrella.bank"],"senderIP":"70.116.162.10","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=70.116.162.10 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=70.116.162.10 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542umbrella4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@umbrella.bank"],"senderIP":"70.116.162.10","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=70.116.162.10 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=70.116.162.10 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: jacquelinea@ccdfi.com
emailsendingserver: 40.107.237.126
emailsubject: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi
filehash: <DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>
filename: from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-26T16:14:39.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 70.116.162.10 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@stark.bank"],"senderIP":"92.173.101.39","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=92.173.101.39 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=92.173.101.39 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com",
"emailsendingserver": "40.107.92.98",
"emailsubject": "NEW EFT-258562 PMT-RECEIPT-Ccdfi",
"filehash": "<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>",
"filename": "from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatTime\":\"2023-10-26T15:55:11.000Z\",\"threat\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2023-10-26T15:56:23.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"NEW EFT-258562 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":98800,\"headerFrom\":\"\\\"EFT Notification via Ccdfi FILE-Scanner\\\"\\r\\n <john@stretfordendsolutions.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"john@stretfordendsolutions.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7\",\"md5\":\"f57ab820730b3458025418091748e62c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attstarked\",\"sha256\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"md5\":\"4f69a3ebc27b8436379b29d3a0142890\",\"filename\":\"employee loan d619825-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"aad68e8a-2de1-4cf6-d707-079042f92547\",\"QID\":\"3tvd1d23yf-1\",\"GUID\":\"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb\",\"sender\":\"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com\",\"recipient\":[\"pdixon@stark.bank\"],\"senderIP\":\"92.173.101.39\",\"messageID\":\"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>\"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=92.173.101.39 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=92.173.101.39 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-26T15:56:23.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "92.173.101.39"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@stark.bank"],"senderIP":"92.173.101.39","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=92.173.101.39 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=92.173.101.39 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@stark.bank"],"senderIP":"92.173.101.39","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=92.173.101.39 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=92.173.101.39 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com
emailsendingserver: 40.107.92.98
emailsubject: NEW EFT-258562 PMT-RECEIPT-Ccdfi
filehash: <6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>
filename: from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-26T15:56:23.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 92.173.101.39 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"9.42.130.160","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=9.42.130.160 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=9.42.130.160 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com",
"emailsendingserver": "40.107.92.98",
"emailsubject": "NEW EFT-258562 PMT-RECEIPT-Ccdfi",
"filehash": "<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>",
"filename": "from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatTime\":\"2023-10-26T15:55:11.000Z\",\"threat\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2023-10-26T15:56:23.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"NEW EFT-258562 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":98800,\"headerFrom\":\"\\\"EFT Notification via Ccdfi FILE-Scanner\\\"\\r\\n <john@stretfordendsolutions.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"john@stretfordendsolutions.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7\",\"md5\":\"f57ab820730b3458025418091748e62c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attwayneed\",\"sha256\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"md5\":\"4f69a3ebc27b8436379b29d3a0142890\",\"filename\":\"employee loan d619825-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"aad68e8a-2de1-4cf6-d707-079042f92547\",\"QID\":\"3tvd1d23yf-1\",\"GUID\":\"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb\",\"sender\":\"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com\",\"recipient\":[\"pdixon@wayne.bank\"],\"senderIP\":\"9.42.130.160\",\"messageID\":\"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>\"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=9.42.130.160 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=9.42.130.160 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-26T15:56:23.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "9.42.130.160"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"9.42.130.160","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=9.42.130.160 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=9.42.130.160 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"9.42.130.160","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=9.42.130.160 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=9.42.130.160 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com
emailsendingserver: 40.107.92.98
emailsubject: NEW EFT-258562 PMT-RECEIPT-Ccdfi
filehash: <6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>
filename: from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-26T15:56:23.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 9.42.130.160 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"108.194.19.38","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=108.194.19.38 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=108.194.19.38 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com",
"emailsendingserver": "40.107.92.98",
"emailsubject": "NEW EFT-258562 PMT-RECEIPT-Ccdfi",
"filehash": "<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>",
"filename": "from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatTime\":\"2023-10-26T15:55:11.000Z\",\"threat\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2023-10-26T15:56:23.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"NEW EFT-258562 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":98800,\"headerFrom\":\"\\\"EFT Notification via Ccdfi FILE-Scanner\\\"\\r\\n <john@stretfordendsolutions.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"john@stretfordendsolutions.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7\",\"md5\":\"f57ab820730b3458025418091748e62c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attoscorped\",\"sha256\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"md5\":\"4f69a3ebc27b8436379b29d3a0142890\",\"filename\":\"employee loan d619825-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"aad68e8a-2de1-4cf6-d707-079042f92547\",\"QID\":\"3tvd1d23yf-1\",\"GUID\":\"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb\",\"sender\":\"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com\",\"recipient\":[\"pdixon@oscorp.bank\"],\"senderIP\":\"108.194.19.38\",\"messageID\":\"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>\"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=108.194.19.38 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=108.194.19.38 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-26T15:56:23.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "108.194.19.38"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"108.194.19.38","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=108.194.19.38 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=108.194.19.38 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"108.194.19.38","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=108.194.19.38 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=108.194.19.38 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com
emailsendingserver: 40.107.92.98
emailsubject: NEW EFT-258562 PMT-RECEIPT-Ccdfi
filehash: <6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>
filename: from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-26T15:56:23.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 108.194.19.38 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"250.152.78.203","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=250.152.78.203 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=250.152.78.203 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com",
"emailsendingserver": "40.107.92.98",
"emailsubject": "NEW EFT-258562 PMT-RECEIPT-Ccdfi",
"filehash": "<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>",
"filename": "from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatTime\":\"2023-10-26T15:55:11.000Z\",\"threat\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2023-10-26T15:56:23.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"NEW EFT-258562 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":98800,\"headerFrom\":\"\\\"EFT Notification via Ccdfi FILE-Scanner\\\"\\r\\n <john@stretfordendsolutions.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"john@stretfordendsolutions.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7\",\"md5\":\"f57ab820730b3458025418091748e62c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attwayneed\",\"sha256\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"md5\":\"4f69a3ebc27b8436379b29d3a0142890\",\"filename\":\"employee loan d619825-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"aad68e8a-2de1-4cf6-d707-079042f92547\",\"QID\":\"3tvd1d23yf-1\",\"GUID\":\"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb\",\"sender\":\"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com\",\"recipient\":[\"pdixon@wayne.bank\"],\"senderIP\":\"250.152.78.203\",\"messageID\":\"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>\"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=250.152.78.203 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=250.152.78.203 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-26T15:56:23.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "250.152.78.203"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"250.152.78.203","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=250.152.78.203 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=250.152.78.203 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"250.152.78.203","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=250.152.78.203 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=250.152.78.203 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com
emailsendingserver: 40.107.92.98
emailsubject: NEW EFT-258562 PMT-RECEIPT-Ccdfi
filehash: <6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>
filename: from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-26T15:56:23.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 250.152.78.203 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"125.254.144.192","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=125.254.144.192 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=125.254.144.192 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com",
"emailsendingserver": "40.107.92.98",
"emailsubject": "NEW EFT-258562 PMT-RECEIPT-Ccdfi",
"filehash": "<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>",
"filename": "from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatTime\":\"2023-10-26T15:55:11.000Z\",\"threat\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2023-10-26T15:56:23.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"NEW EFT-258562 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":98800,\"headerFrom\":\"\\\"EFT Notification via Ccdfi FILE-Scanner\\\"\\r\\n <john@stretfordendsolutions.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"john@stretfordendsolutions.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7\",\"md5\":\"f57ab820730b3458025418091748e62c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attoscorped\",\"sha256\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"md5\":\"4f69a3ebc27b8436379b29d3a0142890\",\"filename\":\"employee loan d619825-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"aad68e8a-2de1-4cf6-d707-079042f92547\",\"QID\":\"3tvd1d23yf-1\",\"GUID\":\"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb\",\"sender\":\"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com\",\"recipient\":[\"pdixon@oscorp.bank\"],\"senderIP\":\"125.254.144.192\",\"messageID\":\"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>\"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=125.254.144.192 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=125.254.144.192 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-26T15:56:23.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "125.254.144.192"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"125.254.144.192","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=125.254.144.192 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=125.254.144.192 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"125.254.144.192","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=125.254.144.192 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=125.254.144.192 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com
emailsendingserver: 40.107.92.98
emailsubject: NEW EFT-258562 PMT-RECEIPT-Ccdfi
filehash: <6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>
filename: from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-26T15:56:23.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 125.254.144.192 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@stark.bank"],"senderIP":"143.242.194.31","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=143.242.194.31 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=143.242.194.31 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com",
"emailsendingserver": "40.107.92.98",
"emailsubject": "NEW EFT-258562 PMT-RECEIPT-Ccdfi",
"filehash": "<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>",
"filename": "from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatTime\":\"2023-10-26T15:55:11.000Z\",\"threat\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2023-10-26T15:56:23.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"NEW EFT-258562 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":98800,\"headerFrom\":\"\\\"EFT Notification via Ccdfi FILE-Scanner\\\"\\r\\n <john@stretfordendsolutions.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"john@stretfordendsolutions.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7\",\"md5\":\"f57ab820730b3458025418091748e62c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attstarked\",\"sha256\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"md5\":\"4f69a3ebc27b8436379b29d3a0142890\",\"filename\":\"employee loan d619825-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"aad68e8a-2de1-4cf6-d707-079042f92547\",\"QID\":\"3tvd1d23yf-1\",\"GUID\":\"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb\",\"sender\":\"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com\",\"recipient\":[\"pdixon@stark.bank\"],\"senderIP\":\"143.242.194.31\",\"messageID\":\"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>\"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=143.242.194.31 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=143.242.194.31 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-26T15:56:23.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "143.242.194.31"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@stark.bank"],"senderIP":"143.242.194.31","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=143.242.194.31 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=143.242.194.31 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@stark.bank"],"senderIP":"143.242.194.31","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=143.242.194.31 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=143.242.194.31 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com
emailsendingserver: 40.107.92.98
emailsubject: NEW EFT-258562 PMT-RECEIPT-Ccdfi
filehash: <6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>
filename: from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-26T15:56:23.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 143.242.194.31 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"113.205.104.188","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=113.205.104.188 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=113.205.104.188 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com",
"emailsendingserver": "40.107.92.98",
"emailsubject": "NEW EFT-258562 PMT-RECEIPT-Ccdfi",
"filehash": "<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>",
"filename": "from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatTime\":\"2023-10-26T15:55:11.000Z\",\"threat\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2023-10-26T15:56:23.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"NEW EFT-258562 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":98800,\"headerFrom\":\"\\\"EFT Notification via Ccdfi FILE-Scanner\\\"\\r\\n <john@stretfordendsolutions.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"john@stretfordendsolutions.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7\",\"md5\":\"f57ab820730b3458025418091748e62c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attwayneed\",\"sha256\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"md5\":\"4f69a3ebc27b8436379b29d3a0142890\",\"filename\":\"employee loan d619825-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"aad68e8a-2de1-4cf6-d707-079042f92547\",\"QID\":\"3tvd1d23yf-1\",\"GUID\":\"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb\",\"sender\":\"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com\",\"recipient\":[\"pdixon@wayne.bank\"],\"senderIP\":\"113.205.104.188\",\"messageID\":\"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>\"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=113.205.104.188 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=113.205.104.188 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-26T15:56:23.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "113.205.104.188"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"113.205.104.188","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=113.205.104.188 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=113.205.104.188 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"113.205.104.188","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=113.205.104.188 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=113.205.104.188 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com
emailsendingserver: 40.107.92.98
emailsubject: NEW EFT-258562 PMT-RECEIPT-Ccdfi
filehash: <6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>
filename: from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-26T15:56:23.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 113.205.104.188 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attumbrellaed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@umbrella.bank"],"senderIP":"56.227.217.186","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=56.227.217.186 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=56.227.217.186 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com",
"emailsendingserver": "40.107.92.98",
"emailsubject": "NEW EFT-258562 PMT-RECEIPT-Ccdfi",
"filehash": "<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>",
"filename": "from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatTime\":\"2023-10-26T15:55:11.000Z\",\"threat\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"campaignID\":null,\"threatType\":\"attumbrellament\"}],\"messageTime\":\"2023-10-26T15:56:23.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"NEW EFT-258562 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attumbrellament Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":98800,\"headerFrom\":\"\\\"EFT Notification via Ccdfi FILE-Scanner\\\"\\r\\n <john@stretfordendsolutions.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"john@stretfordendsolutions.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7\",\"md5\":\"f57ab820730b3458025418091748e62c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"md5\":\"4f69a3ebc27b8436379b29d3a0142890\",\"filename\":\"employee loan d619825-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"aad68e8a-2de1-4cf6-d707-079042f92547\",\"QID\":\"3tvd1d23yf-1\",\"GUID\":\"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb\",\"sender\":\"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com\",\"recipient\":[\"pdixon@umbrella.bank\"],\"senderIP\":\"56.227.217.186\",\"messageID\":\"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>\"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=56.227.217.186 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=56.227.217.186 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-26T15:56:23.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "56.227.217.186"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attumbrellaed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@umbrella.bank"],"senderIP":"56.227.217.186","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=56.227.217.186 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=56.227.217.186 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attumbrellaed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@umbrella.bank"],"senderIP":"56.227.217.186","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=56.227.217.186 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=56.227.217.186 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com
emailsendingserver: 40.107.92.98
emailsubject: NEW EFT-258562 PMT-RECEIPT-Ccdfi
filehash: <6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>
filename: from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-26T15:56:23.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 56.227.217.186 | Explain this syslog message |
<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=237.4.222.113 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=214.94.54.253 spt=45306 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=214.94.54.253 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:193.118.53.194"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=237.4.222.113 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=214.94.54.253 spt=45306 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 \" dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=214.94.54.253 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661617234542 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 45306,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "214.94.54.253",
"serverIP": "237.4.222.113",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=237.4.222.113 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=214.94.54.253 spt=45306 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=214.94.54.253 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=237.4.222.113 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=214.94.54.253 spt=45306 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=214.94.54.253 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:193.118.53.194']
productids: [0]
sourceinfo: unknown
localstarttime: 1661617234542
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 45306
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 214.94.54.253
serverIP: 237.4.222.113
userName: - | Explain this syslog message |
<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=27.82.142.70 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=221.230.32.81 spt=45306 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=221.230.32.81 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:193.118.53.194"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=27.82.142.70 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=221.230.32.81 spt=45306 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 \" dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=221.230.32.81 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661617234542 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 45306,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "221.230.32.81",
"serverIP": "27.82.142.70",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=27.82.142.70 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=221.230.32.81 spt=45306 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=221.230.32.81 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=27.82.142.70 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=221.230.32.81 spt=45306 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=221.230.32.81 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:193.118.53.194']
productids: [0]
sourceinfo: unknown
localstarttime: 1661617234542
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 45306
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 221.230.32.81
serverIP: 27.82.142.70
userName: - | Explain this syslog message |
<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=69.128.89.187 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=johndoe src=37.69.148.49 spt=45434 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=37.69.148.49 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:85.215.209.170",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=69.128.89.187 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=johndoe src=37.69.148.49 spt=45434 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36\" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=37.69.148.49 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661617286985 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/manager/html",
"clientport": 45434,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "37.69.148.49",
"serverIP": "69.128.89.187",
"userName": "johndoe"
} | Create a JSON artifact from the message |
<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=69.128.89.187 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=johndoe src=37.69.148.49 spt=45434 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=37.69.148.49 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=69.128.89.187 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=johndoe src=37.69.148.49 spt=45434 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=37.69.148.49 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:85.215.209.170', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1661617286985
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /manager/html
clientport: 45434
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 37.69.148.49
serverIP: 69.128.89.187
userName: johndoe | Explain this syslog message |
<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=121.100.180.88 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=nighthawk src=116.68.147.68 spt=45434 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=116.68.147.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:85.215.209.170",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=121.100.180.88 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=nighthawk src=116.68.147.68 spt=45434 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36\" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=116.68.147.68 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661617286985 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/manager/html",
"clientport": 45434,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "116.68.147.68",
"serverIP": "121.100.180.88",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=121.100.180.88 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=nighthawk src=116.68.147.68 spt=45434 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=116.68.147.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=121.100.180.88 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=nighthawk src=116.68.147.68 spt=45434 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=116.68.147.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:85.215.209.170', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1661617286985
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /manager/html
clientport: 45434
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 116.68.147.68
serverIP: 121.100.180.88
userName: nighthawk | Explain this syslog message |
<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=93.195.7.164 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=fish src=216.16.31.147 spt=45434 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.16.31.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:85.215.209.170",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=93.195.7.164 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=fish src=216.16.31.147 spt=45434 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36\" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.16.31.147 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661617286985 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/manager/html",
"clientport": 45434,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "216.16.31.147",
"serverIP": "93.195.7.164",
"userName": "fish"
} | Create a JSON artifact from the message |
<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=93.195.7.164 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=fish src=216.16.31.147 spt=45434 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.16.31.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=93.195.7.164 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=fish src=216.16.31.147 spt=45434 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.16.31.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:85.215.209.170', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1661617286985
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /manager/html
clientport: 45434
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 216.16.31.147
serverIP: 93.195.7.164
userName: fish | Explain this syslog message |
<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=27.145.243.195 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=171.220.191.176 spt=45306 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=171.220.191.176 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:193.118.53.194"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=27.145.243.195 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=171.220.191.176 spt=45306 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 \" dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=171.220.191.176 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661617234542 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 45306,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "171.220.191.176",
"serverIP": "27.145.243.195",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=27.145.243.195 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=171.220.191.176 spt=45306 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=171.220.191.176 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=27.145.243.195 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=171.220.191.176 spt=45306 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=171.220.191.176 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:193.118.53.194']
productids: [0]
sourceinfo: unknown
localstarttime: 1661617234542
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 45306
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 171.220.191.176
serverIP: 27.145.243.195
userName: - | Explain this syslog message |
<185>Aug 27 11:34:18 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=220.20.218.39 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.107.120.91 spt=8350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:34:18 rt=1661618058952 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.9" dvchost=WAFirewall externalId=182e02776c8-d7cf3a50 cn2=8350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.107.120.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:141.98.81.125",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 27 11:34:18 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=220.20.218.39 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=169.107.120.91 spt=8350 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 27 2022 11:34:18 rt=1661618058952 request=/remote/fgt_lang requestClientApplication=\"Python-urllib/3.9\" dvchost=WAFirewall externalId=182e02776c8-d7cf3a50 cn2=8350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.107.120.91 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661618058952 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/remote/fgt_lang",
"clientport": 8350,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "169.107.120.91",
"serverIP": "220.20.218.39",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 27 11:34:18 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=220.20.218.39 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.107.120.91 spt=8350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:34:18 rt=1661618058952 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.9" dvchost=WAFirewall externalId=182e02776c8-d7cf3a50 cn2=8350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.107.120.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 27 11:34:18 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=220.20.218.39 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.107.120.91 spt=8350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:34:18 rt=1661618058952 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.9" dvchost=WAFirewall externalId=182e02776c8-d7cf3a50 cn2=8350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.107.120.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:141.98.81.125', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1661618058952
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /remote/fgt_lang
clientport: 8350
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 169.107.120.91
serverIP: 220.20.218.39
userName: - | Explain this syslog message |
<185>Aug 27 11:34:18 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=53.145.253.184 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=11.152.189.181 spt=8350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:34:18 rt=1661618058952 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.9" dvchost=WAFirewall externalId=182e02776c8-d7cf3a50 cn2=8350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=11.152.189.181 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:141.98.81.125",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 27 11:34:18 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=53.145.253.184 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=11.152.189.181 spt=8350 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 27 2022 11:34:18 rt=1661618058952 request=/remote/fgt_lang requestClientApplication=\"Python-urllib/3.9\" dvchost=WAFirewall externalId=182e02776c8-d7cf3a50 cn2=8350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=11.152.189.181 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661618058952 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/remote/fgt_lang",
"clientport": 8350,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "11.152.189.181",
"serverIP": "53.145.253.184",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 27 11:34:18 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=53.145.253.184 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=11.152.189.181 spt=8350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:34:18 rt=1661618058952 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.9" dvchost=WAFirewall externalId=182e02776c8-d7cf3a50 cn2=8350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=11.152.189.181 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 27 11:34:18 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=53.145.253.184 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=11.152.189.181 spt=8350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:34:18 rt=1661618058952 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.9" dvchost=WAFirewall externalId=182e02776c8-d7cf3a50 cn2=8350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=11.152.189.181 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:141.98.81.125', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1661618058952
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /remote/fgt_lang
clientport: 8350
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 11.152.189.181
serverIP: 53.145.253.184
userName: - | Explain this syslog message |
<185>Nov 1 12:34:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=71.78.182.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=122.100.118.166 spt=38890 requestMethod=GET app=TLSv1.3 requestContext="-" start=Nov 01 2023 12:34:10 rt=1698860050572 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b8bf32870-74bd0ac7 cn2=38890 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.100.118.166 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 38890,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1698860050572 ",
"message": "<185>Nov 1 12:34:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=71.78.182.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=122.100.118.166 spt=38890 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Nov 01 2023 12:34:10 rt=1698860050572 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b8bf32870-74bd0ac7 cn2=38890 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.100.118.166 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"GEO_IP_BLOCK",
"ProxyIP:124.117.193.34"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "122.100.118.166",
"serverIP": "71.78.182.48",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 1 12:34:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=71.78.182.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=122.100.118.166 spt=38890 requestMethod=GET app=TLSv1.3 requestContext="-" start=Nov 01 2023 12:34:10 rt=1698860050572 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b8bf32870-74bd0ac7 cn2=38890 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.100.118.166 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 1 12:34:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=71.78.182.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=122.100.118.166 spt=38890 requestMethod=GET app=TLSv1.3 requestContext="-" start=Nov 01 2023 12:34:10 rt=1698860050572 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b8bf32870-74bd0ac7 cn2=38890 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.100.118.166 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 38890
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1698860050572
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'GEO_IP_BLOCK', 'ProxyIP:124.117.193.34']
vendorcode: 342
streamName: barracuda_waf
clientIP: 122.100.118.166
serverIP: 71.78.182.48
userName: - | Explain this syslog message |
<185>Nov 1 12:34:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=45.87.174.155 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=123.67.26.33 spt=38890 requestMethod=GET app=TLSv1.3 requestContext="-" start=Nov 01 2023 12:34:10 rt=1698860050572 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b8bf32870-74bd0ac7 cn2=38890 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=123.67.26.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 38890,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1698860050572 ",
"message": "<185>Nov 1 12:34:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=45.87.174.155 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=123.67.26.33 spt=38890 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Nov 01 2023 12:34:10 rt=1698860050572 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b8bf32870-74bd0ac7 cn2=38890 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=123.67.26.33 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"GEO_IP_BLOCK",
"ProxyIP:124.117.193.34"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "123.67.26.33",
"serverIP": "45.87.174.155",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 1 12:34:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=45.87.174.155 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=123.67.26.33 spt=38890 requestMethod=GET app=TLSv1.3 requestContext="-" start=Nov 01 2023 12:34:10 rt=1698860050572 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b8bf32870-74bd0ac7 cn2=38890 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=123.67.26.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 1 12:34:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=45.87.174.155 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=123.67.26.33 spt=38890 requestMethod=GET app=TLSv1.3 requestContext="-" start=Nov 01 2023 12:34:10 rt=1698860050572 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b8bf32870-74bd0ac7 cn2=38890 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=123.67.26.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 38890
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1698860050572
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'GEO_IP_BLOCK', 'ProxyIP:124.117.193.34']
vendorcode: 342
streamName: barracuda_waf
clientIP: 123.67.26.33
serverIP: 45.87.174.155
userName: - | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t14.148.149.205\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"14.148.149.205","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53440,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.514Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t14.148.149.205\\n\\tSource Port:\\t\\t53440\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC1.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"14.148.149.205\",\"IpPort\":\"53440\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393912,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC1.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "105393912",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "14.148.149.205",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t14.148.149.205\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"14.148.149.205","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t14.148.149.205\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"14.148.149.205","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53440
messagetype: auth_failure
productids: [6]
senderhost: UWDC1.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 105393912
streamName: microsoft-windows-security-auditing
clientIP: 14.148.149.205
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t157.106.53.133\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"157.106.53.133","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53440,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.514Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t157.106.53.133\\n\\tSource Port:\\t\\t53440\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC1.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"157.106.53.133\",\"IpPort\":\"53440\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393912,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC1.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "105393912",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "157.106.53.133",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t157.106.53.133\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"157.106.53.133","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t157.106.53.133\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"157.106.53.133","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53440
messagetype: auth_failure
productids: [6]
senderhost: UWDC1.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 105393912
streamName: microsoft-windows-security-auditing
clientIP: 157.106.53.133
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t97.78.9.104\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"97.78.9.104","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53441,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.519Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.umbrella.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t97.78.9.104\\n\\tSource Port:\\t\\t53441\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"UWDC1.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.umbrella.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"97.78.9.104\",\"IpPort\":\"53441\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393913,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC1.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "105393913",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "97.78.9.104",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t97.78.9.104\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"97.78.9.104","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t97.78.9.104\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"97.78.9.104","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53441
messagetype: auth_failure
productids: [6]
senderhost: UWDC1.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 105393913
streamName: microsoft-windows-security-auditing
clientIP: 97.78.9.104
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t69.55.162.211\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"69.55.162.211","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53441,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.519Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t69.55.162.211\\n\\tSource Port:\\t\\t53441\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC1.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"69.55.162.211\",\"IpPort\":\"53441\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393913,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC1.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "105393913",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "69.55.162.211",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t69.55.162.211\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"69.55.162.211","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t69.55.162.211\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"69.55.162.211","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53441
messagetype: auth_failure
productids: [6]
senderhost: UWDC1.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 105393913
streamName: microsoft-windows-security-auditing
clientIP: 69.55.162.211
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.492Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t238.27.20.120\n\tSource Port:\t\t53438\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"238.27.20.120","IpPort":"53438","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393910,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53438,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.492Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t238.27.20.120\\n\\tSource Port:\\t\\t53438\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC1.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"238.27.20.120\",\"IpPort\":\"53438\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393910,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC1.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "105393910",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "238.27.20.120",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.492Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t238.27.20.120\n\tSource Port:\t\t53438\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"238.27.20.120","IpPort":"53438","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393910,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.492Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t238.27.20.120\n\tSource Port:\t\t53438\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"238.27.20.120","IpPort":"53438","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393910,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53438
messagetype: auth_failure
productids: [6]
senderhost: UWDC1.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 105393910
streamName: microsoft-windows-security-auditing
clientIP: 238.27.20.120
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.492Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t124.70.51.96\n\tSource Port:\t\t53438\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"124.70.51.96","IpPort":"53438","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393910,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53438,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.492Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t124.70.51.96\\n\\tSource Port:\\t\\t53438\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC1.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"124.70.51.96\",\"IpPort\":\"53438\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393910,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC1.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "105393910",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "124.70.51.96",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.492Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t124.70.51.96\n\tSource Port:\t\t53438\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"124.70.51.96","IpPort":"53438","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393910,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.492Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t124.70.51.96\n\tSource Port:\t\t53438\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"124.70.51.96","IpPort":"53438","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393910,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53438
messagetype: auth_failure
productids: [6]
senderhost: UWDC1.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 105393910
streamName: microsoft-windows-security-auditing
clientIP: 124.70.51.96
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.499Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t85.219.166.56\n\tSource Port:\t\t53439\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC1.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"85.219.166.56","IpPort":"53439","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393911,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53439,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.499Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t85.219.166.56\\n\\tSource Port:\\t\\t53439\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"UWDC1.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"85.219.166.56\",\"IpPort\":\"53439\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393911,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC1.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "105393911",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "85.219.166.56",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.499Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t85.219.166.56\n\tSource Port:\t\t53439\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC1.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"85.219.166.56","IpPort":"53439","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393911,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.499Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t85.219.166.56\n\tSource Port:\t\t53439\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC1.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"85.219.166.56","IpPort":"53439","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393911,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53439
messagetype: auth_failure
productids: [6]
senderhost: UWDC1.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 105393911
streamName: microsoft-windows-security-auditing
clientIP: 85.219.166.56
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.499Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t235.91.239.173\n\tSource Port:\t\t53439\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"235.91.239.173","IpPort":"53439","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393911,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53439,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.499Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t235.91.239.173\\n\\tSource Port:\\t\\t53439\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC1.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"235.91.239.173\",\"IpPort\":\"53439\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393911,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC1.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "105393911",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "235.91.239.173",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.499Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t235.91.239.173\n\tSource Port:\t\t53439\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"235.91.239.173","IpPort":"53439","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393911,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.499Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t235.91.239.173\n\tSource Port:\t\t53439\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"235.91.239.173","IpPort":"53439","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393911,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53439
messagetype: auth_failure
productids: [6]
senderhost: UWDC1.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 105393911
streamName: microsoft-windows-security-auditing
clientIP: 235.91.239.173
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.448Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t71.171.38.65\n\tSource Port:\t\t53437\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"71.171.38.65","IpPort":"53437","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393909,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53437,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.448Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t71.171.38.65\\n\\tSource Port:\\t\\t53437\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC1.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"71.171.38.65\",\"IpPort\":\"53437\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393909,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC1.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "105393909",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "71.171.38.65",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.448Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t71.171.38.65\n\tSource Port:\t\t53437\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"71.171.38.65","IpPort":"53437","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393909,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.