input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"19.44.188.182","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=19.44.188.182 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=19.44.188.182 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"19.44.188.182","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=19.44.188.182 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=19.44.188.182 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: jacquelinea@ccdfi.com emailsendingserver: 40.107.237.126 emailsubject: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi filehash: <DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> filename: from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-26T16:14:39.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 19.44.188.182
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"197.190.96.16","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=197.190.96.16 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=197.190.96.16 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "jacquelinea@ccdfi.com", "emailsendingserver": "40.107.237.126", "emailsubject": "FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi", "filehash": "<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>", "filename": "from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatTime\":\"2023-10-26T16:13:32.000Z\",\"threat\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2023-10-26T16:14:39.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":190373,\"headerFrom\":\"Jacqueline Aguilar <jacquelinea@ccdfi.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"jacquelinea@ccdfi.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attoscorped\",\"sha256\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"md5\":\"44d0ab7332f1a029935bce372fb3c5d5\",\"filename\":\"employee jacquelinea d1067554-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61\",\"md5\":\"966b2674e9ff61c72ea242856ff4995c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9\",\"md5\":\"3484bb76ac447d3141c427edcd948261\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3\",\"md5\":\"8ceac3d79daf846749f6438b1fead7af\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"}],\"completelyRewritten\":false,\"id\":\"3f7bb408-8c1e-f280-ebe6-534d37fb93dc\",\"QID\":\"3tvagqj54f-1\",\"GUID\":\"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8\",\"sender\":\"jacquelinea@ccdfi.com\",\"recipient\":[\"pdixon@oscorp.bank\"],\"senderIP\":\"197.190.96.16\",\"messageID\":\"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>\"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=197.190.96.16 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=197.190.96.16 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-26T16:14:39.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "197.190.96.16" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"197.190.96.16","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=197.190.96.16 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=197.190.96.16 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"197.190.96.16","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=197.190.96.16 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=197.190.96.16 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: jacquelinea@ccdfi.com emailsendingserver: 40.107.237.126 emailsubject: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi filehash: <DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> filename: from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-26T16:14:39.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 197.190.96.16
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"97.254.136.226","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=97.254.136.226 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=97.254.136.226 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "jacquelinea@ccdfi.com", "emailsendingserver": "40.107.237.126", "emailsubject": "FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi", "filehash": "<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>", "filename": "from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatTime\":\"2023-10-26T16:13:32.000Z\",\"threat\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2023-10-26T16:14:39.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":190373,\"headerFrom\":\"Jacqueline Aguilar <jacquelinea@ccdfi.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"jacquelinea@ccdfi.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attoscorped\",\"sha256\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"md5\":\"44d0ab7332f1a029935bce372fb3c5d5\",\"filename\":\"employee jacquelinea d1067554-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61\",\"md5\":\"966b2674e9ff61c72ea242856ff4995c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9\",\"md5\":\"3484bb76ac447d3141c427edcd948261\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3\",\"md5\":\"8ceac3d79daf846749f6438b1fead7af\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"}],\"completelyRewritten\":false,\"id\":\"3f7bb408-8c1e-f280-ebe6-534d37fb93dc\",\"QID\":\"3tvagqj54f-1\",\"GUID\":\"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8\",\"sender\":\"jacquelinea@ccdfi.com\",\"recipient\":[\"pdixon@oscorp.bank\"],\"senderIP\":\"97.254.136.226\",\"messageID\":\"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>\"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=97.254.136.226 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=97.254.136.226 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-26T16:14:39.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "97.254.136.226" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"97.254.136.226","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=97.254.136.226 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=97.254.136.226 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"97.254.136.226","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=97.254.136.226 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=97.254.136.226 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: jacquelinea@ccdfi.com emailsendingserver: 40.107.237.126 emailsubject: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi filehash: <DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> filename: from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-26T16:14:39.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 97.254.136.226
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attacmement"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542acme4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@acme.bank"],"senderIP":"183.140.118.146","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=183.140.118.146 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=183.140.118.146 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "jacquelinea@ccdfi.com", "emailsendingserver": "40.107.237.126", "emailsubject": "FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi", "filehash": "<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>", "filename": "from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatTime\":\"2023-10-26T16:13:32.000Z\",\"threat\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"campaignID\":null,\"threatType\":\"attacmement\"}],\"messageTime\":\"2023-10-26T16:14:39.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attacmement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":190373,\"headerFrom\":\"Jacqueline Aguilar <jacquelinea@ccdfi.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"jacquelinea@ccdfi.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attacmeed\",\"sha256\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"md5\":\"44d0ab7332f1a029935bce372fb3c5d5\",\"filename\":\"employee jacquelinea d1067554-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61\",\"md5\":\"966b2674e9ff61c72ea242856ff4995c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"0e7da0b480ee472dd3e542acme4c6080a0841b17b1f0d593e13fb8132729565c9\",\"md5\":\"3484bb76ac447d3141c427edcd948261\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attacmeed\",\"sha256\":\"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3\",\"md5\":\"8ceac3d79daf846749f6438b1fead7af\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"}],\"completelyRewritten\":false,\"id\":\"3f7bb408-8c1e-f280-ebe6-534d37fb93dc\",\"QID\":\"3tvagqj54f-1\",\"GUID\":\"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8\",\"sender\":\"jacquelinea@ccdfi.com\",\"recipient\":[\"pdixon@acme.bank\"],\"senderIP\":\"183.140.118.146\",\"messageID\":\"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>\"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=183.140.118.146 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=183.140.118.146 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-26T16:14:39.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "183.140.118.146" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attacmement"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542acme4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@acme.bank"],"senderIP":"183.140.118.146","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=183.140.118.146 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=183.140.118.146 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attacmement"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542acme4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@acme.bank"],"senderIP":"183.140.118.146","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=183.140.118.146 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=183.140.118.146 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: jacquelinea@ccdfi.com emailsendingserver: 40.107.237.126 emailsubject: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi filehash: <DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> filename: from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-26T16:14:39.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 183.140.118.146
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"166.139.55.163","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=166.139.55.163 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=166.139.55.163 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "jacquelinea@ccdfi.com", "emailsendingserver": "40.107.237.126", "emailsubject": "FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi", "filehash": "<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>", "filename": "from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatTime\":\"2023-10-26T16:13:32.000Z\",\"threat\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2023-10-26T16:14:39.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":190373,\"headerFrom\":\"Jacqueline Aguilar <jacquelinea@ccdfi.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"jacquelinea@ccdfi.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attoscorped\",\"sha256\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"md5\":\"44d0ab7332f1a029935bce372fb3c5d5\",\"filename\":\"employee jacquelinea d1067554-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61\",\"md5\":\"966b2674e9ff61c72ea242856ff4995c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9\",\"md5\":\"3484bb76ac447d3141c427edcd948261\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3\",\"md5\":\"8ceac3d79daf846749f6438b1fead7af\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"}],\"completelyRewritten\":false,\"id\":\"3f7bb408-8c1e-f280-ebe6-534d37fb93dc\",\"QID\":\"3tvagqj54f-1\",\"GUID\":\"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8\",\"sender\":\"jacquelinea@ccdfi.com\",\"recipient\":[\"pdixon@oscorp.bank\"],\"senderIP\":\"166.139.55.163\",\"messageID\":\"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>\"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=166.139.55.163 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=166.139.55.163 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-26T16:14:39.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "166.139.55.163" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"166.139.55.163","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=166.139.55.163 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=166.139.55.163 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542oscorp4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"166.139.55.163","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=166.139.55.163 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=166.139.55.163 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: jacquelinea@ccdfi.com emailsendingserver: 40.107.237.126 emailsubject: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi filehash: <DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> filename: from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-26T16:14:39.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 166.139.55.163
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542wayne4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"182.62.48.216","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=182.62.48.216 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=182.62.48.216 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "jacquelinea@ccdfi.com", "emailsendingserver": "40.107.237.126", "emailsubject": "FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi", "filehash": "<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>", "filename": "from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatTime\":\"2023-10-26T16:13:32.000Z\",\"threat\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2023-10-26T16:14:39.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":190373,\"headerFrom\":\"Jacqueline Aguilar <jacquelinea@ccdfi.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"jacquelinea@ccdfi.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attwayneed\",\"sha256\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"md5\":\"44d0ab7332f1a029935bce372fb3c5d5\",\"filename\":\"employee jacquelinea d1067554-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61\",\"md5\":\"966b2674e9ff61c72ea242856ff4995c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"0e7da0b480ee472dd3e542wayne4c6080a0841b17b1f0d593e13fb8132729565c9\",\"md5\":\"3484bb76ac447d3141c427edcd948261\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attwayneed\",\"sha256\":\"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3\",\"md5\":\"8ceac3d79daf846749f6438b1fead7af\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"}],\"completelyRewritten\":false,\"id\":\"3f7bb408-8c1e-f280-ebe6-534d37fb93dc\",\"QID\":\"3tvagqj54f-1\",\"GUID\":\"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8\",\"sender\":\"jacquelinea@ccdfi.com\",\"recipient\":[\"pdixon@wayne.bank\"],\"senderIP\":\"182.62.48.216\",\"messageID\":\"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>\"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=182.62.48.216 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=182.62.48.216 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-26T16:14:39.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "182.62.48.216" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542wayne4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"182.62.48.216","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=182.62.48.216 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=182.62.48.216 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542wayne4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"182.62.48.216","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=182.62.48.216 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=182.62.48.216 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: jacquelinea@ccdfi.com emailsendingserver: 40.107.237.126 emailsubject: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi filehash: <DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> filename: from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-26T16:14:39.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 182.62.48.216
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542umbrella4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@umbrella.bank"],"senderIP":"70.116.162.10","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=70.116.162.10 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=70.116.162.10 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "jacquelinea@ccdfi.com", "emailsendingserver": "40.107.237.126", "emailsubject": "FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi", "filehash": "<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>", "filename": "from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"threatTime\":\"2023-10-26T16:13:32.000Z\",\"threat\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"campaignID\":null,\"threatType\":\"attumbrellament\"}],\"messageTime\":\"2023-10-26T16:14:39.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attumbrellament Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":190373,\"headerFrom\":\"Jacqueline Aguilar <jacquelinea@ccdfi.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"jacquelinea@ccdfi.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attumbrellaed\",\"sha256\":\"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07\",\"md5\":\"44d0ab7332f1a029935bce372fb3c5d5\",\"filename\":\"employee jacquelinea d1067554-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61\",\"md5\":\"966b2674e9ff61c72ea242856ff4995c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"0e7da0b480ee472dd3e542umbrella4c6080a0841b17b1f0d593e13fb8132729565c9\",\"md5\":\"3484bb76ac447d3141c427edcd948261\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3\",\"md5\":\"8ceac3d79daf846749f6438b1fead7af\",\"filename\":\"image001.jpg\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"image/jpeg\",\"contentType\":\"image/jpeg\"}],\"completelyRewritten\":false,\"id\":\"3f7bb408-8c1e-f280-ebe6-534d37fb93dc\",\"QID\":\"3tvagqj54f-1\",\"GUID\":\"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8\",\"sender\":\"jacquelinea@ccdfi.com\",\"recipient\":[\"pdixon@umbrella.bank\"],\"senderIP\":\"70.116.162.10\",\"messageID\":\"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>\"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=70.116.162.10 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=70.116.162.10 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-26T16:14:39.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "70.116.162.10" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542umbrella4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@umbrella.bank"],"senderIP":"70.116.162.10","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=70.116.162.10 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=70.116.162.10 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","threatTime":"2023-10-26T16:13:32.000Z","threat":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-10-26T16:14:39.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":190373,"headerFrom":"Jacqueline Aguilar <jacquelinea@ccdfi.com>","headerReplyTo":null,"fromAddress":["jacquelinea@ccdfi.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"03aee25672cbc87ae6924a605211051f3b9ba45bf9a644c044e64fe7b2fa4f07","md5":"44d0ab7332f1a029935bce372fb3c5d5","filename":"employee jacquelinea d1067554-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"f032ab3fe4c2a1aa68577e86e927a2fbd6345f7885a3bb78a46aec3789fe1e61","md5":"966b2674e9ff61c72ea242856ff4995c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"0e7da0b480ee472dd3e542umbrella4c6080a0841b17b1f0d593e13fb8132729565c9","md5":"3484bb76ac447d3141c427edcd948261","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"b1fbc5c38dd602d4865e97ad9596648ecd00d935bc5875dab0970a6e859982a3","md5":"8ceac3d79daf846749f6438b1fead7af","filename":"image001.jpg","sandboxStatus":"NOT_SUPPORTED","oContentType":"image/jpeg","contentType":"image/jpeg"}],"completelyRewritten":false,"id":"3f7bb408-8c1e-f280-ebe6-534d37fb93dc","QID":"3tvagqj54f-1","GUID":"2o1nUSoNY3WteBC5v0jOjk-Tz-X4XdP8","sender":"jacquelinea@ccdfi.com","recipient":["pdixon@umbrella.bank"],"senderIP":"70.116.162.10","messageID":"<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com>"} ::: fileHash=<DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> ::: fileName=from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: serverIP=70.116.162.10 ::: emailFrom=jacquelinea@ccdfi.com ::: created_at=2023-10-26T16:14:39.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T16:14:39.000Z ::: emailSendingServer=70.116.162.10 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: jacquelinea@ccdfi.com emailsendingserver: 40.107.237.126 emailsubject: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi filehash: <DM6PR16MB3274AC7BA4EFA33028CDD322B8DDA@DM6PR16MB3274.namprd16.prod.outlook.com> filename: from: jacquelinea@ccdfi.com subj: FW: NEW EFT-442389 PMT-RECEIPT-Ccdfi messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-26T16:14:39.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 70.116.162.10
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@stark.bank"],"senderIP":"92.173.101.39","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=92.173.101.39 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=92.173.101.39 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com", "emailsendingserver": "40.107.92.98", "emailsubject": "NEW EFT-258562 PMT-RECEIPT-Ccdfi", "filehash": "<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>", "filename": "from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatTime\":\"2023-10-26T15:55:11.000Z\",\"threat\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2023-10-26T15:56:23.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"NEW EFT-258562 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":98800,\"headerFrom\":\"\\\"EFT Notification via Ccdfi FILE-Scanner\\\"\\r\\n <john@stretfordendsolutions.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"john@stretfordendsolutions.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7\",\"md5\":\"f57ab820730b3458025418091748e62c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attstarked\",\"sha256\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"md5\":\"4f69a3ebc27b8436379b29d3a0142890\",\"filename\":\"employee loan d619825-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"aad68e8a-2de1-4cf6-d707-079042f92547\",\"QID\":\"3tvd1d23yf-1\",\"GUID\":\"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb\",\"sender\":\"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com\",\"recipient\":[\"pdixon@stark.bank\"],\"senderIP\":\"92.173.101.39\",\"messageID\":\"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>\"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=92.173.101.39 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=92.173.101.39 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-26T15:56:23.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "92.173.101.39" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@stark.bank"],"senderIP":"92.173.101.39","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=92.173.101.39 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=92.173.101.39 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@stark.bank"],"senderIP":"92.173.101.39","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=92.173.101.39 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=92.173.101.39 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com emailsendingserver: 40.107.92.98 emailsubject: NEW EFT-258562 PMT-RECEIPT-Ccdfi filehash: <6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> filename: from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-26T15:56:23.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 92.173.101.39
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"9.42.130.160","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=9.42.130.160 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=9.42.130.160 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com", "emailsendingserver": "40.107.92.98", "emailsubject": "NEW EFT-258562 PMT-RECEIPT-Ccdfi", "filehash": "<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>", "filename": "from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatTime\":\"2023-10-26T15:55:11.000Z\",\"threat\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2023-10-26T15:56:23.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"NEW EFT-258562 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":98800,\"headerFrom\":\"\\\"EFT Notification via Ccdfi FILE-Scanner\\\"\\r\\n <john@stretfordendsolutions.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"john@stretfordendsolutions.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7\",\"md5\":\"f57ab820730b3458025418091748e62c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attwayneed\",\"sha256\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"md5\":\"4f69a3ebc27b8436379b29d3a0142890\",\"filename\":\"employee loan d619825-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"aad68e8a-2de1-4cf6-d707-079042f92547\",\"QID\":\"3tvd1d23yf-1\",\"GUID\":\"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb\",\"sender\":\"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com\",\"recipient\":[\"pdixon@wayne.bank\"],\"senderIP\":\"9.42.130.160\",\"messageID\":\"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>\"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=9.42.130.160 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=9.42.130.160 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-26T15:56:23.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "9.42.130.160" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"9.42.130.160","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=9.42.130.160 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=9.42.130.160 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"9.42.130.160","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=9.42.130.160 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=9.42.130.160 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com emailsendingserver: 40.107.92.98 emailsubject: NEW EFT-258562 PMT-RECEIPT-Ccdfi filehash: <6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> filename: from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-26T15:56:23.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 9.42.130.160
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"108.194.19.38","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=108.194.19.38 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=108.194.19.38 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com", "emailsendingserver": "40.107.92.98", "emailsubject": "NEW EFT-258562 PMT-RECEIPT-Ccdfi", "filehash": "<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>", "filename": "from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatTime\":\"2023-10-26T15:55:11.000Z\",\"threat\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2023-10-26T15:56:23.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"NEW EFT-258562 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":98800,\"headerFrom\":\"\\\"EFT Notification via Ccdfi FILE-Scanner\\\"\\r\\n <john@stretfordendsolutions.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"john@stretfordendsolutions.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7\",\"md5\":\"f57ab820730b3458025418091748e62c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attoscorped\",\"sha256\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"md5\":\"4f69a3ebc27b8436379b29d3a0142890\",\"filename\":\"employee loan d619825-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"aad68e8a-2de1-4cf6-d707-079042f92547\",\"QID\":\"3tvd1d23yf-1\",\"GUID\":\"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb\",\"sender\":\"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com\",\"recipient\":[\"pdixon@oscorp.bank\"],\"senderIP\":\"108.194.19.38\",\"messageID\":\"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>\"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=108.194.19.38 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=108.194.19.38 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-26T15:56:23.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "108.194.19.38" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"108.194.19.38","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=108.194.19.38 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=108.194.19.38 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"108.194.19.38","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=108.194.19.38 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=108.194.19.38 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com emailsendingserver: 40.107.92.98 emailsubject: NEW EFT-258562 PMT-RECEIPT-Ccdfi filehash: <6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> filename: from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-26T15:56:23.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 108.194.19.38
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"250.152.78.203","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=250.152.78.203 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=250.152.78.203 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com", "emailsendingserver": "40.107.92.98", "emailsubject": "NEW EFT-258562 PMT-RECEIPT-Ccdfi", "filehash": "<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>", "filename": "from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatTime\":\"2023-10-26T15:55:11.000Z\",\"threat\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2023-10-26T15:56:23.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"NEW EFT-258562 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":98800,\"headerFrom\":\"\\\"EFT Notification via Ccdfi FILE-Scanner\\\"\\r\\n <john@stretfordendsolutions.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"john@stretfordendsolutions.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7\",\"md5\":\"f57ab820730b3458025418091748e62c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attwayneed\",\"sha256\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"md5\":\"4f69a3ebc27b8436379b29d3a0142890\",\"filename\":\"employee loan d619825-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"aad68e8a-2de1-4cf6-d707-079042f92547\",\"QID\":\"3tvd1d23yf-1\",\"GUID\":\"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb\",\"sender\":\"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com\",\"recipient\":[\"pdixon@wayne.bank\"],\"senderIP\":\"250.152.78.203\",\"messageID\":\"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>\"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=250.152.78.203 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=250.152.78.203 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-26T15:56:23.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "250.152.78.203" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"250.152.78.203","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=250.152.78.203 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=250.152.78.203 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"250.152.78.203","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=250.152.78.203 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=250.152.78.203 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com emailsendingserver: 40.107.92.98 emailsubject: NEW EFT-258562 PMT-RECEIPT-Ccdfi filehash: <6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> filename: from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-26T15:56:23.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 250.152.78.203
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"125.254.144.192","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=125.254.144.192 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=125.254.144.192 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com", "emailsendingserver": "40.107.92.98", "emailsubject": "NEW EFT-258562 PMT-RECEIPT-Ccdfi", "filehash": "<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>", "filename": "from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatTime\":\"2023-10-26T15:55:11.000Z\",\"threat\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2023-10-26T15:56:23.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"NEW EFT-258562 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":98800,\"headerFrom\":\"\\\"EFT Notification via Ccdfi FILE-Scanner\\\"\\r\\n <john@stretfordendsolutions.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"john@stretfordendsolutions.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7\",\"md5\":\"f57ab820730b3458025418091748e62c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attoscorped\",\"sha256\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"md5\":\"4f69a3ebc27b8436379b29d3a0142890\",\"filename\":\"employee loan d619825-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"aad68e8a-2de1-4cf6-d707-079042f92547\",\"QID\":\"3tvd1d23yf-1\",\"GUID\":\"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb\",\"sender\":\"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com\",\"recipient\":[\"pdixon@oscorp.bank\"],\"senderIP\":\"125.254.144.192\",\"messageID\":\"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>\"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=125.254.144.192 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=125.254.144.192 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-26T15:56:23.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "125.254.144.192" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"125.254.144.192","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=125.254.144.192 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=125.254.144.192 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attoscorped","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@oscorp.bank"],"senderIP":"125.254.144.192","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=125.254.144.192 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=125.254.144.192 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com emailsendingserver: 40.107.92.98 emailsubject: NEW EFT-258562 PMT-RECEIPT-Ccdfi filehash: <6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> filename: from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-26T15:56:23.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 125.254.144.192
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@stark.bank"],"senderIP":"143.242.194.31","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=143.242.194.31 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=143.242.194.31 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com", "emailsendingserver": "40.107.92.98", "emailsubject": "NEW EFT-258562 PMT-RECEIPT-Ccdfi", "filehash": "<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>", "filename": "from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatTime\":\"2023-10-26T15:55:11.000Z\",\"threat\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2023-10-26T15:56:23.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"NEW EFT-258562 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":98800,\"headerFrom\":\"\\\"EFT Notification via Ccdfi FILE-Scanner\\\"\\r\\n <john@stretfordendsolutions.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"john@stretfordendsolutions.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7\",\"md5\":\"f57ab820730b3458025418091748e62c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attstarked\",\"sha256\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"md5\":\"4f69a3ebc27b8436379b29d3a0142890\",\"filename\":\"employee loan d619825-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"aad68e8a-2de1-4cf6-d707-079042f92547\",\"QID\":\"3tvd1d23yf-1\",\"GUID\":\"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb\",\"sender\":\"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com\",\"recipient\":[\"pdixon@stark.bank\"],\"senderIP\":\"143.242.194.31\",\"messageID\":\"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>\"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=143.242.194.31 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=143.242.194.31 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-26T15:56:23.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "143.242.194.31" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@stark.bank"],"senderIP":"143.242.194.31","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=143.242.194.31 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=143.242.194.31 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attstarked","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@stark.bank"],"senderIP":"143.242.194.31","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=143.242.194.31 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=143.242.194.31 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com emailsendingserver: 40.107.92.98 emailsubject: NEW EFT-258562 PMT-RECEIPT-Ccdfi filehash: <6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> filename: from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-26T15:56:23.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 143.242.194.31
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"113.205.104.188","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=113.205.104.188 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=113.205.104.188 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com", "emailsendingserver": "40.107.92.98", "emailsubject": "NEW EFT-258562 PMT-RECEIPT-Ccdfi", "filehash": "<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>", "filename": "from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatTime\":\"2023-10-26T15:55:11.000Z\",\"threat\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2023-10-26T15:56:23.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"NEW EFT-258562 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":98800,\"headerFrom\":\"\\\"EFT Notification via Ccdfi FILE-Scanner\\\"\\r\\n <john@stretfordendsolutions.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"john@stretfordendsolutions.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7\",\"md5\":\"f57ab820730b3458025418091748e62c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attwayneed\",\"sha256\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"md5\":\"4f69a3ebc27b8436379b29d3a0142890\",\"filename\":\"employee loan d619825-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"aad68e8a-2de1-4cf6-d707-079042f92547\",\"QID\":\"3tvd1d23yf-1\",\"GUID\":\"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb\",\"sender\":\"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com\",\"recipient\":[\"pdixon@wayne.bank\"],\"senderIP\":\"113.205.104.188\",\"messageID\":\"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>\"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=113.205.104.188 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=113.205.104.188 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-26T15:56:23.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "113.205.104.188" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"113.205.104.188","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=113.205.104.188 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=113.205.104.188 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attwayneed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@wayne.bank"],"senderIP":"113.205.104.188","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=113.205.104.188 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=113.205.104.188 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com emailsendingserver: 40.107.92.98 emailsubject: NEW EFT-258562 PMT-RECEIPT-Ccdfi filehash: <6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> filename: from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-26T15:56:23.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 113.205.104.188
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attumbrellaed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@umbrella.bank"],"senderIP":"56.227.217.186","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=56.227.217.186 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=56.227.217.186 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com", "emailsendingserver": "40.107.92.98", "emailsubject": "NEW EFT-258562 PMT-RECEIPT-Ccdfi", "filehash": "<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>", "filename": "from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"threatTime\":\"2023-10-26T15:55:11.000Z\",\"threat\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"campaignID\":null,\"threatType\":\"attumbrellament\"}],\"messageTime\":\"2023-10-26T15:56:23.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"NEW EFT-258562 PMT-RECEIPT-Ccdfi\",\"quarantineFolder\":\"Attumbrellament Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\",\"allow_relay\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":98800,\"headerFrom\":\"\\\"EFT Notification via Ccdfi FILE-Scanner\\\"\\r\\n <john@stretfordendsolutions.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"john@stretfordendsolutions.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"loan@ccdfi.com\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7\",\"md5\":\"f57ab820730b3458025418091748e62c\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372\",\"md5\":\"4f69a3ebc27b8436379b29d3a0142890\",\"filename\":\"employee loan d619825-0000.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"aad68e8a-2de1-4cf6-d707-079042f92547\",\"QID\":\"3tvd1d23yf-1\",\"GUID\":\"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb\",\"sender\":\"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com\",\"recipient\":[\"pdixon@umbrella.bank\"],\"senderIP\":\"56.227.217.186\",\"messageID\":\"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>\"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=56.227.217.186 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=56.227.217.186 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-26T15:56:23.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "56.227.217.186" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attumbrellaed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@umbrella.bank"],"senderIP":"56.227.217.186","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=56.227.217.186 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=56.227.217.186 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","threatTime":"2023-10-26T15:55:11.000Z","threat":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-10-26T15:56:23.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"NEW EFT-258562 PMT-RECEIPT-Ccdfi","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound","allow_relay"],"modulesRun":["av","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":98800,"headerFrom":"\"EFT Notification via Ccdfi FILE-Scanner\"\r\n <john@stretfordendsolutions.com>","headerReplyTo":null,"fromAddress":["john@stretfordendsolutions.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["loan@ccdfi.com"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"6810b2e7b3a667ed4727b110614ba9a324ba197274bbcd6b88d0bca98657fec7","md5":"f57ab820730b3458025418091748e62c","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"},{"disposition":"attumbrellaed","sha256":"d449afb9bb86bc1340bc275b23edbbe388be82446b68bfef24423828aae5a372","md5":"4f69a3ebc27b8436379b29d3a0142890","filename":"employee loan d619825-0000.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"aad68e8a-2de1-4cf6-d707-079042f92547","QID":"3tvd1d23yf-1","GUID":"SDimCC9vGXoODNLEPLXDhx-gSXweNIsb","sender":"loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com","recipient":["pdixon@umbrella.bank"],"senderIP":"56.227.217.186","messageID":"<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com>"} ::: fileHash=<6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> ::: fileName=from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: serverIP=56.227.217.186 ::: emailFrom=loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com ::: created_at=2023-10-26T15:56:23.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=NEW EFT-258562 PMT-RECEIPT-Ccdfi ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-26T15:56:23.000Z ::: emailSendingServer=56.227.217.186 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com emailsendingserver: 40.107.92.98 emailsubject: NEW EFT-258562 PMT-RECEIPT-Ccdfi filehash: <6f904e45-862e-00e8-66cd-0cfc4745bf10@stretfordendsolutions.com> filename: from: loan+srs=v/no9=gi=stretfordendsolutions.com=john@ccdfi.com subj: NEW EFT-258562 PMT-RECEIPT-Ccdfi messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-26T15:56:23.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 56.227.217.186
Explain this syslog message
<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=237.4.222.113 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=214.94.54.253 spt=45306 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=214.94.54.253 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:193.118.53.194" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=237.4.222.113 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=214.94.54.253 spt=45306 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 \" dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=214.94.54.253 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1661617234542 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 45306, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "214.94.54.253", "serverIP": "237.4.222.113", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=237.4.222.113 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=214.94.54.253 spt=45306 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=214.94.54.253 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=237.4.222.113 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=214.94.54.253 spt=45306 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=214.94.54.253 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:193.118.53.194'] productids: [0] sourceinfo: unknown localstarttime: 1661617234542 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 45306 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 214.94.54.253 serverIP: 237.4.222.113 userName: -
Explain this syslog message
<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=27.82.142.70 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=221.230.32.81 spt=45306 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=221.230.32.81 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:193.118.53.194" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=27.82.142.70 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=221.230.32.81 spt=45306 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 \" dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=221.230.32.81 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1661617234542 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 45306, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "221.230.32.81", "serverIP": "27.82.142.70", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=27.82.142.70 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=221.230.32.81 spt=45306 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=221.230.32.81 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=27.82.142.70 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=221.230.32.81 spt=45306 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=221.230.32.81 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:193.118.53.194'] productids: [0] sourceinfo: unknown localstarttime: 1661617234542 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 45306 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 221.230.32.81 serverIP: 27.82.142.70 userName: -
Explain this syslog message
<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=69.128.89.187 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=johndoe src=37.69.148.49 spt=45434 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=37.69.148.49 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:85.215.209.170", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=69.128.89.187 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=johndoe src=37.69.148.49 spt=45434 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36\" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=37.69.148.49 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1661617286985 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/manager/html", "clientport": 45434, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "37.69.148.49", "serverIP": "69.128.89.187", "userName": "johndoe" }
Create a JSON artifact from the message
<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=69.128.89.187 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=johndoe src=37.69.148.49 spt=45434 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=37.69.148.49 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=69.128.89.187 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=johndoe src=37.69.148.49 spt=45434 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=37.69.148.49 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:85.215.209.170', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1661617286985 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /manager/html clientport: 45434 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 37.69.148.49 serverIP: 69.128.89.187 userName: johndoe
Explain this syslog message
<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=121.100.180.88 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=nighthawk src=116.68.147.68 spt=45434 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=116.68.147.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:85.215.209.170", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=121.100.180.88 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=nighthawk src=116.68.147.68 spt=45434 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36\" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=116.68.147.68 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1661617286985 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/manager/html", "clientport": 45434, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "116.68.147.68", "serverIP": "121.100.180.88", "userName": "nighthawk" }
Create a JSON artifact from the message
<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=121.100.180.88 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=nighthawk src=116.68.147.68 spt=45434 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=116.68.147.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=121.100.180.88 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=nighthawk src=116.68.147.68 spt=45434 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=116.68.147.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:85.215.209.170', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1661617286985 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /manager/html clientport: 45434 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 116.68.147.68 serverIP: 121.100.180.88 userName: nighthawk
Explain this syslog message
<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=93.195.7.164 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=fish src=216.16.31.147 spt=45434 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.16.31.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:85.215.209.170", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=93.195.7.164 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=fish src=216.16.31.147 spt=45434 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36\" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.16.31.147 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1661617286985 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/manager/html", "clientport": 45434, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "216.16.31.147", "serverIP": "93.195.7.164", "userName": "fish" }
Create a JSON artifact from the message
<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=93.195.7.164 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=fish src=216.16.31.147 spt=45434 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.16.31.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 27 11:21:27 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=93.195.7.164 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=fish src=216.16.31.147 spt=45434 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:21:26 rt=1661617286985 request=/manager/html requestClientApplication="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36" dvchost=WAFirewall externalId=182e01baf49-41c62444 cn2=45434 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.16.31.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:85.215.209.170', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1661617286985 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /manager/html clientport: 45434 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 216.16.31.147 serverIP: 93.195.7.164 userName: fish
Explain this syslog message
<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=27.145.243.195 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=171.220.191.176 spt=45306 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=171.220.191.176 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:193.118.53.194" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=27.145.243.195 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=171.220.191.176 spt=45306 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 \" dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=171.220.191.176 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1661617234542 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 45306, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "171.220.191.176", "serverIP": "27.145.243.195", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=27.145.243.195 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=171.220.191.176 spt=45306 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=171.220.191.176 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 27 11:20:34 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=27.145.243.195 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=171.220.191.176 spt=45306 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 11:20:34 rt=1661617234542 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182e01ae26d-e5fe5f58 cn2=45306 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=171.220.191.176 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:193.118.53.194'] productids: [0] sourceinfo: unknown localstarttime: 1661617234542 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 45306 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 171.220.191.176 serverIP: 27.145.243.195 userName: -
Explain this syslog message
<185>Aug 27 11:34:18 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=220.20.218.39 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.107.120.91 spt=8350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:34:18 rt=1661618058952 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.9" dvchost=WAFirewall externalId=182e02776c8-d7cf3a50 cn2=8350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.107.120.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:141.98.81.125", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Aug 27 11:34:18 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=220.20.218.39 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=169.107.120.91 spt=8350 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 27 2022 11:34:18 rt=1661618058952 request=/remote/fgt_lang requestClientApplication=\"Python-urllib/3.9\" dvchost=WAFirewall externalId=182e02776c8-d7cf3a50 cn2=8350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.107.120.91 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1661618058952 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/remote/fgt_lang", "clientport": 8350, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "169.107.120.91", "serverIP": "220.20.218.39", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 27 11:34:18 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=220.20.218.39 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.107.120.91 spt=8350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:34:18 rt=1661618058952 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.9" dvchost=WAFirewall externalId=182e02776c8-d7cf3a50 cn2=8350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.107.120.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 27 11:34:18 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=220.20.218.39 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.107.120.91 spt=8350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:34:18 rt=1661618058952 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.9" dvchost=WAFirewall externalId=182e02776c8-d7cf3a50 cn2=8350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.107.120.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:141.98.81.125', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1661618058952 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /remote/fgt_lang clientport: 8350 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 169.107.120.91 serverIP: 220.20.218.39 userName: -
Explain this syslog message
<185>Aug 27 11:34:18 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=53.145.253.184 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=11.152.189.181 spt=8350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:34:18 rt=1661618058952 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.9" dvchost=WAFirewall externalId=182e02776c8-d7cf3a50 cn2=8350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=11.152.189.181 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:141.98.81.125", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Aug 27 11:34:18 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=53.145.253.184 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=11.152.189.181 spt=8350 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 27 2022 11:34:18 rt=1661618058952 request=/remote/fgt_lang requestClientApplication=\"Python-urllib/3.9\" dvchost=WAFirewall externalId=182e02776c8-d7cf3a50 cn2=8350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=11.152.189.181 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1661618058952 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/remote/fgt_lang", "clientport": 8350, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "11.152.189.181", "serverIP": "53.145.253.184", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 27 11:34:18 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=53.145.253.184 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=11.152.189.181 spt=8350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:34:18 rt=1661618058952 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.9" dvchost=WAFirewall externalId=182e02776c8-d7cf3a50 cn2=8350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=11.152.189.181 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 27 11:34:18 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=53.145.253.184 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=11.152.189.181 spt=8350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 27 2022 11:34:18 rt=1661618058952 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.9" dvchost=WAFirewall externalId=182e02776c8-d7cf3a50 cn2=8350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=11.152.189.181 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:141.98.81.125', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1661618058952 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /remote/fgt_lang clientport: 8350 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 11.152.189.181 serverIP: 53.145.253.184 userName: -
Explain this syslog message
<185>Nov 1 12:34:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=71.78.182.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=122.100.118.166 spt=38890 requestMethod=GET app=TLSv1.3 requestContext="-" start=Nov 01 2023 12:34:10 rt=1698860050572 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b8bf32870-74bd0ac7 cn2=38890 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.100.118.166 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 38890, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1698860050572 ", "message": "<185>Nov 1 12:34:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=71.78.182.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=122.100.118.166 spt=38890 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Nov 01 2023 12:34:10 rt=1698860050572 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b8bf32870-74bd0ac7 cn2=38890 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.100.118.166 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "GEO_IP_BLOCK", "ProxyIP:124.117.193.34" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "122.100.118.166", "serverIP": "71.78.182.48", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 1 12:34:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=71.78.182.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=122.100.118.166 spt=38890 requestMethod=GET app=TLSv1.3 requestContext="-" start=Nov 01 2023 12:34:10 rt=1698860050572 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b8bf32870-74bd0ac7 cn2=38890 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.100.118.166 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 1 12:34:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=71.78.182.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=122.100.118.166 spt=38890 requestMethod=GET app=TLSv1.3 requestContext="-" start=Nov 01 2023 12:34:10 rt=1698860050572 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b8bf32870-74bd0ac7 cn2=38890 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.100.118.166 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 38890 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1698860050572 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'GEO_IP_BLOCK', 'ProxyIP:124.117.193.34'] vendorcode: 342 streamName: barracuda_waf clientIP: 122.100.118.166 serverIP: 71.78.182.48 userName: -
Explain this syslog message
<185>Nov 1 12:34:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=45.87.174.155 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=123.67.26.33 spt=38890 requestMethod=GET app=TLSv1.3 requestContext="-" start=Nov 01 2023 12:34:10 rt=1698860050572 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b8bf32870-74bd0ac7 cn2=38890 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=123.67.26.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 38890, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1698860050572 ", "message": "<185>Nov 1 12:34:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=45.87.174.155 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=123.67.26.33 spt=38890 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Nov 01 2023 12:34:10 rt=1698860050572 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b8bf32870-74bd0ac7 cn2=38890 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=123.67.26.33 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "GEO_IP_BLOCK", "ProxyIP:124.117.193.34" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "123.67.26.33", "serverIP": "45.87.174.155", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 1 12:34:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=45.87.174.155 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=123.67.26.33 spt=38890 requestMethod=GET app=TLSv1.3 requestContext="-" start=Nov 01 2023 12:34:10 rt=1698860050572 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b8bf32870-74bd0ac7 cn2=38890 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=123.67.26.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 1 12:34:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=45.87.174.155 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=123.67.26.33 spt=38890 requestMethod=GET app=TLSv1.3 requestContext="-" start=Nov 01 2023 12:34:10 rt=1698860050572 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b8bf32870-74bd0ac7 cn2=38890 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=123.67.26.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 38890 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1698860050572 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'GEO_IP_BLOCK', 'ProxyIP:124.117.193.34'] vendorcode: 342 streamName: barracuda_waf clientIP: 123.67.26.33 serverIP: 45.87.174.155 userName: -
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t14.148.149.205\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"14.148.149.205","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}}
{ "action": "Logon", "clientport": 53440, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.514Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t14.148.149.205\\n\\tSource Port:\\t\\t53440\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC1.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"14.148.149.205\",\"IpPort\":\"53440\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393912,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393912", "streamName": "microsoft-windows-security-auditing", "clientIP": "14.148.149.205", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t14.148.149.205\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"14.148.149.205","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t14.148.149.205\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"14.148.149.205","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53440 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393912 streamName: microsoft-windows-security-auditing clientIP: 14.148.149.205 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t157.106.53.133\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"157.106.53.133","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}}
{ "action": "Logon", "clientport": 53440, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.514Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t157.106.53.133\\n\\tSource Port:\\t\\t53440\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC1.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"157.106.53.133\",\"IpPort\":\"53440\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393912,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393912", "streamName": "microsoft-windows-security-auditing", "clientIP": "157.106.53.133", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t157.106.53.133\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"157.106.53.133","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t157.106.53.133\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"157.106.53.133","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53440 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393912 streamName: microsoft-windows-security-auditing clientIP: 157.106.53.133 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t97.78.9.104\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"97.78.9.104","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}}
{ "action": "Logon", "clientport": 53441, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.519Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.umbrella.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t97.78.9.104\\n\\tSource Port:\\t\\t53441\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"UWDC1.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.umbrella.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"97.78.9.104\",\"IpPort\":\"53441\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393913,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393913", "streamName": "microsoft-windows-security-auditing", "clientIP": "97.78.9.104", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t97.78.9.104\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"97.78.9.104","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t97.78.9.104\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"97.78.9.104","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53441 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393913 streamName: microsoft-windows-security-auditing clientIP: 97.78.9.104 userName: janedoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t69.55.162.211\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"69.55.162.211","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}}
{ "action": "Logon", "clientport": 53441, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.519Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t69.55.162.211\\n\\tSource Port:\\t\\t53441\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC1.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"69.55.162.211\",\"IpPort\":\"53441\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393913,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393913", "streamName": "microsoft-windows-security-auditing", "clientIP": "69.55.162.211", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t69.55.162.211\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"69.55.162.211","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t69.55.162.211\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"69.55.162.211","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53441 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393913 streamName: microsoft-windows-security-auditing clientIP: 69.55.162.211 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.492Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t238.27.20.120\n\tSource Port:\t\t53438\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"238.27.20.120","IpPort":"53438","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393910,"task":"Logon"}}
{ "action": "Logon", "clientport": 53438, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.492Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t238.27.20.120\\n\\tSource Port:\\t\\t53438\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC1.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"238.27.20.120\",\"IpPort\":\"53438\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393910,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393910", "streamName": "microsoft-windows-security-auditing", "clientIP": "238.27.20.120", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.492Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t238.27.20.120\n\tSource Port:\t\t53438\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"238.27.20.120","IpPort":"53438","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393910,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.492Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t238.27.20.120\n\tSource Port:\t\t53438\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"238.27.20.120","IpPort":"53438","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393910,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53438 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393910 streamName: microsoft-windows-security-auditing clientIP: 238.27.20.120 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.492Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t124.70.51.96\n\tSource Port:\t\t53438\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"124.70.51.96","IpPort":"53438","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393910,"task":"Logon"}}
{ "action": "Logon", "clientport": 53438, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.492Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t124.70.51.96\\n\\tSource Port:\\t\\t53438\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC1.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"124.70.51.96\",\"IpPort\":\"53438\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393910,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393910", "streamName": "microsoft-windows-security-auditing", "clientIP": "124.70.51.96", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.492Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t124.70.51.96\n\tSource Port:\t\t53438\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"124.70.51.96","IpPort":"53438","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393910,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.492Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t124.70.51.96\n\tSource Port:\t\t53438\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"124.70.51.96","IpPort":"53438","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393910,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53438 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393910 streamName: microsoft-windows-security-auditing clientIP: 124.70.51.96 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.499Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t85.219.166.56\n\tSource Port:\t\t53439\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC1.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"85.219.166.56","IpPort":"53439","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393911,"task":"Logon"}}
{ "action": "Logon", "clientport": 53439, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.499Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t85.219.166.56\\n\\tSource Port:\\t\\t53439\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"UWDC1.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"85.219.166.56\",\"IpPort\":\"53439\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393911,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393911", "streamName": "microsoft-windows-security-auditing", "clientIP": "85.219.166.56", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.499Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t85.219.166.56\n\tSource Port:\t\t53439\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC1.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"85.219.166.56","IpPort":"53439","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393911,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.499Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t85.219.166.56\n\tSource Port:\t\t53439\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC1.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"85.219.166.56","IpPort":"53439","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393911,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53439 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393911 streamName: microsoft-windows-security-auditing clientIP: 85.219.166.56 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.499Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t235.91.239.173\n\tSource Port:\t\t53439\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"235.91.239.173","IpPort":"53439","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393911,"task":"Logon"}}
{ "action": "Logon", "clientport": 53439, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.499Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t235.91.239.173\\n\\tSource Port:\\t\\t53439\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC1.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"235.91.239.173\",\"IpPort\":\"53439\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393911,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393911", "streamName": "microsoft-windows-security-auditing", "clientIP": "235.91.239.173", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.499Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t235.91.239.173\n\tSource Port:\t\t53439\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"235.91.239.173","IpPort":"53439","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393911,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.499Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t235.91.239.173\n\tSource Port:\t\t53439\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"235.91.239.173","IpPort":"53439","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393911,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53439 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393911 streamName: microsoft-windows-security-auditing clientIP: 235.91.239.173 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.448Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t71.171.38.65\n\tSource Port:\t\t53437\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"71.171.38.65","IpPort":"53437","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393909,"task":"Logon"}}
{ "action": "Logon", "clientport": 53437, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.448Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t71.171.38.65\\n\\tSource Port:\\t\\t53437\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC1.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"71.171.38.65\",\"IpPort\":\"53437\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393909,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393909", "streamName": "microsoft-windows-security-auditing", "clientIP": "71.171.38.65", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.448Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t71.171.38.65\n\tSource Port:\t\t53437\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"71.171.38.65","IpPort":"53437","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393909,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message